Instantiability of RSA-OAEP Under Chosen-Plaintext Attack

被引:0
|
作者
Eike Kiltz
Adam O’Neill
Adam Smith
机构
[1] Ruhr-Universität Bochum,
[2] Georgetown University,undefined
[3] Pennsylvania State University,undefined
来源
Journal of Cryptology | 2017年 / 30卷
关键词
RSA; OAEP; Padding-based encryption; Lossy trapdoor functions; Leftover hash lemma; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash ( i.e., round) functions are modeled as random oracles, meets indistinguishability under chosen-plaintext attack (IND-CPA) in the standard model based on simple, non-interactive, and non-interdependent assumptions on RSA and the hash functions. To prove this, we first give a result on a more general notion called “padding-based” encryption, saying that such a scheme is IND-CPA if (1) its underlying padding transform satisfies a “fooling" condition against small-range distinguishers on a class of high-entropy input distributions, and (2) its trapdoor permutation is sufficiently lossy as defined by Peikert and Waters (STOC 2008). We then show that the first round of OAEP satisfies condition (1) if its hash function is t-wise independent for t roughly proportional to the allowed message length. We clarify that this result requires the hash function to be keyed, and for its key to be included in the public key of RSA-OAEP. We also show that RSA satisfies condition (2) under the Φ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Phi $$\end{document}-Hiding Assumption of Cachin et al. (Eurocrypt 1999). This is the first positive result about the instantiability of RSA-OAEP. In particular, it increases confidence that chosen-plaintext attacks are unlikely to be found against the scheme. In contrast, RSA-OAEP’s predecessor in PKCS #1 v1.5 was shown to be vulnerable to such attacks by Coron et al. (Eurocrypt 2000).
引用
收藏
页码:889 / 919
页数:30
相关论文
共 50 条
  • [21] Chosen-Plaintext Attack on Energy-Efficient Hardware Implementation of GIFT-COFB
    Zhong, Yadi
    Guin, Ujjwal
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 73 - 76
  • [22] Adaptive Chosen-Plaintext Correlation Power Analysis
    Hu, Wen-jing
    Wu, Liji
    Wang, An
    Xie, Xin-Jun
    Zhu, Zhi-Hui
    Luo, Shun
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 494 - 498
  • [23] Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack
    Li, Tuo
    Shi, Yishi
    [J]. JOURNAL OF OPTICS, 2016, 18 (03)
  • [24] Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure
    Yuansheng Liu
    Leo Yu Zhang
    Jia Wang
    Yushu Zhang
    Kwok-wo Wong
    [J]. Nonlinear Dynamics, 2016, 84 : 2241 - 2250
  • [25] Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain
    Peng, Xiang
    Wei, Hengzheng
    Zhang, Peng
    [J]. OPTICS LETTERS, 2006, 31 (22) : 3261 - 3263
  • [26] Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry
    Qin, Wan
    Peng, Xiang
    Meng, Xiangfeng
    Gao, Bruce Z.
    [J]. OPTICAL ENGINEERING, 2011, 50 (06)
  • [27] A Rational Secret-Sharing Scheme Based on RSA-OAEP
    Isshiki, Toshiyuki
    Wada, Koichiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 42 - 49
  • [28] An Efficient Chosen-Plaintext Attack on an Image Fusion Encryption Algorithm Based on DNA Operation and Hyperchaos
    Zhu, Shuqin
    Zhu, Congxu
    [J]. ENTROPY, 2021, 23 (07)
  • [29] Chosen-plaintext Attack on Double-random-phase-encoding-based Image Hiding Method
    Xu, Hongsheng
    Li, Guirong
    Zhu, Xianchen
    [J]. MIPPR 2015: REMOTE SENSING IMAGE PROCESSING, GEOGRAPHIC INFORMATION SYSTEMS, AND OTHER APPLICATIONS, 2015, 9815
  • [30] Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
    Liu, Yuansheng
    Zhang, Leo Yu
    Wang, Jia
    Zhang, Yushu
    Wong, Kwok-wo
    [J]. NONLINEAR DYNAMICS, 2016, 84 (04) : 2241 - 2250