Instantiability of RSA-OAEP Under Chosen-Plaintext Attack

被引:0
|
作者
Eike Kiltz
Adam O’Neill
Adam Smith
机构
[1] Ruhr-Universität Bochum,
[2] Georgetown University,undefined
[3] Pennsylvania State University,undefined
来源
Journal of Cryptology | 2017年 / 30卷
关键词
RSA; OAEP; Padding-based encryption; Lossy trapdoor functions; Leftover hash lemma; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash ( i.e., round) functions are modeled as random oracles, meets indistinguishability under chosen-plaintext attack (IND-CPA) in the standard model based on simple, non-interactive, and non-interdependent assumptions on RSA and the hash functions. To prove this, we first give a result on a more general notion called “padding-based” encryption, saying that such a scheme is IND-CPA if (1) its underlying padding transform satisfies a “fooling" condition against small-range distinguishers on a class of high-entropy input distributions, and (2) its trapdoor permutation is sufficiently lossy as defined by Peikert and Waters (STOC 2008). We then show that the first round of OAEP satisfies condition (1) if its hash function is t-wise independent for t roughly proportional to the allowed message length. We clarify that this result requires the hash function to be keyed, and for its key to be included in the public key of RSA-OAEP. We also show that RSA satisfies condition (2) under the Φ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Phi $$\end{document}-Hiding Assumption of Cachin et al. (Eurocrypt 1999). This is the first positive result about the instantiability of RSA-OAEP. In particular, it increases confidence that chosen-plaintext attacks are unlikely to be found against the scheme. In contrast, RSA-OAEP’s predecessor in PKCS #1 v1.5 was shown to be vulnerable to such attacks by Coron et al. (Eurocrypt 2000).
引用
收藏
页码:889 / 919
页数:30
相关论文
共 50 条
  • [1] Instantiability of RSA-OAEP under Chosen-Plaintext Attack
    Kiltz, Eike
    O'Neill, Adam
    Smith, Adam
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 295 - +
  • [2] Instantiability of RSA-OAEP Under Chosen-Plaintext Attack
    Kiltz, Eike
    O'Neill, Adam
    Smith, Adam
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (03) : 889 - 919
  • [3] RSA-OAEP Is Secure under the RSA Assumption
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    David Pointcheval
    Jacques Stern
    [J]. Journal of Cryptology, 2004, 17 : 81 - 104
  • [4] RSA-OAEP is secure under the RSA assumption
    Fujisaki, E
    Okamoto, T
    Pointcheval, D
    Stern, J
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (02) : 81 - 104
  • [5] A chosen-plaintext attack on quantum permutation pad
    Piotr Zawadzki
    [J]. Quantum Information Processing, 23
  • [7] Strengthening Security of RSA-OAEP
    Boldyreva, Alexandra
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 399 - 413
  • [8] Chosen-plaintext attack on the double random polarization encryption
    Wang, Lei
    Wu, Quanying
    Situ, Guohai
    [J]. OPTICS EXPRESS, 2019, 27 (22): : 32158 - 32167
  • [9] RSA-OAEP is RKA Secure
    Jia, Dingding
    Li, Bao
    Lu, Xianhui
    Liu, Yamin
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 270 - 281
  • [10] SECURE AND ROBUST SIFT WITH RESISTANCE TO CHOSEN-PLAINTEXT ATTACK
    Hsu, Chao-Yung
    Lu, Chun-Shien
    Pei, Soo-Chang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 997 - 1000