PRF Domain Extension using DAGs Charanjit Jutla IBM T J Watson.

Slides:



Advertisements
Similar presentations
Maximum flow Main goals of the lecture:
Advertisements

Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Secret Sharing Protocols [Sha79,Bla79]
1GR2-00 GR2 Advanced Computer Graphics AGR Lecture 2 Basic Modelling.
Voronoi-based Geospatial Query Processing with MapReduce
Merkle Damgard Revisited: how to Construct a hash Function
Min Cost Flow: Polynomial Algorithms. Overview Recap: Min Cost Flow, Residual Network Potential and Reduced Cost Polynomial Algorithms Approach Capacity.
Proof of correctness; More reductions
Great Theoretical Ideas in Computer Science for Some.
Communication Lower Bound for the Fast Fourier Transform Michael Anderson Communication-Avoiding Algorithms (CS294) Fall 2011.
1 On c-Vertex Ranking of Graphs Yung-Ling Lai & Yi-Ming Chen National Chiayi University Taiwan.
The Topology of Graph Configuration Spaces David G.C. Handron Carnegie Mellon University
CS 253: Algorithms Chapter 22 Graphs Credit: Dr. George Bebis.
Map-making as Graph Drawing Alan Saalfeld Mathematical Cartographer.
Shortest Paths (1/11)  In this section, we shall study the path problems such like  Is there a path from city A to city B?  If there is more than one.
Lecture 7 March 1, 11 discuss HW 2, Problem 3
Optimization of Sequential Networks Step in Synthesis: Problem Flow Table Reduce States Minimum-State Table State Assignment Circuit Transition Table Flip-Flop.
Interval Graph Test.
Blackbox Reductions from Mechanisms to Algorithms.
Discrete Optimization Lecture 4 – Part 3 M. Pawan Kumar Slides available online
Secret Sharing, Matroids, and Non-Shannon Information Inequalities.
A. S. Morse Yale University University of Minnesota June 4, 2014 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
Graphs CSE 331 Section 2 James Daly. Reminders Homework 4 is out Due Thursday in class Project 3 is out Covers graphs (discussed today and Thursday) Due.
Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
The Hash Function “Fugue” Shai Halevi William E. Hall Charanjit S. Jutla IBM T. J. Watson Research Center.
Walks, Paths and Circuits Walks, Paths and Circuits Sanjay Jain, Lecturer, School of Computing.
By: Matthew Ng. AND, XOR, OR, Complement, Circular Left shift, and Addition Modulo Circular Left Shift is done with s positions (0 ≤ s ≤ 31) – Denoted.
Bayesian Networks, Winter Yoav Haimovitch & Ariel Raviv 1.
A Model of Computation for MapReduce
1 Cryptanalysis-tolerant CPA crypt. ● Suppose E, E’ are two encryption schemes which on of them is CPA - secure  E.g., a standard and a proprietary, a.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
Optimization of Pearl’s Method of Conditioning and Greedy-Like Approximation Algorithm for the Vertex Feedback Set Problem Authors: Ann Becker and Dan.
New Bounds for PMAC, TMAC, and XCBC Kazuhiko Minematsu and Toshiyasu Matsushima, NEC Corp. and Waseda University Fast Software Encryption 2007, March 26-28,
Goal Ensure integrity of messages, even in presence of
A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black University of Nevada, Reno, USA Phillip Rogaway University of California,
1 Message Integrity CS255 Winter ‘06. 2 Message Integrity Goal: provide message integrity. No confidentiality. –ex: Protecting public binaries on disk.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
Learning Equivalence Classes of Bayesian-Network Structures David M. Chickering Presented by Dmitry Zinenko.
MATH 310, FALL 2003 (Combinatorial Problem Solving) Lecture 10, Monday, September 22.
Computer Security CS 426 Lecture 3
Let G be a pseudograph with vertex set V, edge set E, and incidence mapping f. Let n be a positive integer. A path of length n between vertex v and vertex.
Approximating the MST Weight in Sublinear Time Bernard Chazelle (Princeton) Ronitt Rubinfeld (NEC) Luca Trevisan (U.C. Berkeley)
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Slide 1 PMAC: A Parallelizable Message Authentication Code Phillip Rogaway Department of Computer Science UC Davis + CMU
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
1 Rainbow Decompositions Raphael Yuster University of Haifa Proc. Amer. Math. Soc. (2008), to appear.
1 CIS 5371 Cryptography 4. Message Authentication Codes B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
1 Message authentication codes, modes of operation, and indifferentiability Kan Yasuda (NTT, Japan) ASK 2011 Aug. 31, Singapore.
© 2001 by Charles E. Leiserson Introduction to AlgorithmsDay 12 L8.1 Introduction to Algorithms 6.046J/18.401J/SMA5503 Lecture 8 Prof. Charles E. Leiserson.
October 5, 2005Copyright © by Erik D. Demaine and Charles E. LeisersonL7.1 Prof. Charles E. Leiserson L ECTURE 8 Hashing II Universal hashing Universality.
Introduction to Graph Theory
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Proof technique (pigeonhole principle)
Circuit Lower Bounds A combinatorial approach to P vs NP
Lecture 18: Uniformity Testing Monotonicity Testing
Cryptography Lecture 12.
Cryptography Lecture 19.
Fast and Secure CBC-type MACs
Cryptography Lecture 11.
Cryptography Lecture 8.
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Cryptography Lecture 13.
Cryptography Lecture 11.
Cryptography Lecture 10.
Presentation transcript:

PRF Domain Extension using DAGs Charanjit Jutla IBM T J Watson

ffff P1 P2P3Pm V1 V2V3Vm n bits to mn bits domain tilde-f

V1 V2 V4 V3 V5 P1 P2P3P5P4 ff f f f C

Requirements on the DAG Directed Acyclic Graph G = (V,E) |V| = m Unique source and sink nodes G is non-redundant –no two nodes have the same set of immediate predecessors Then, PRF Domain Extension to mn bits

V1 V2 V4 V3 V5 P1 P2P3P5P4 ff f f f

A Parallel Mode for Four Processors In general, 3+log* m depth

Really Basic Intuition C_i = f ( P_i xor XOR in E C_ j ) Call M_i = P_i xor XOR in E C_ j M_i is input to node V_i Can two such M_i1 and M_i2 collide? –i1= i2 ::: hopefully plaintexts are different??? –i1 \=i2 XOR C_ j ?= XOR C_ j

Using Galois Field GF(2^n) XOR C_ j ?= XOR C_ j XOR a_{j,i1}*C_ j ?= XOR a_{j,i2}*C_ j

Edge-Colored DAGs Directed Acyclic Graph G = (V,E) |V| = m Edge Coloring ψ: E GF(2^n)* Unique sink node G is non-singular –If two nodes (say u and v) have the same set of immediate predecessors (say W), then exists w \in W :: ψ(w,u) \= ψ(w,v) Then, PRF Domain Extension to mn bits

A Parallel Mode for Four Processors *x *x^2 *(1+x) *1

PMAC [BR02] (Parallelizable Authentication Mode) color m

PMAC [BR02] To be precise…. color m Constant 0

Variable Length Domain Ext. length need not be multiple of n –naïve padding with 10^t doesnt work –how to distinguish b/w full length and partial –UNLESS full length is authenticated differently [PR00], [BR00] naïve CBC-MAC for diff length – flawed – C1 = CBCMAC_f ( P1) – C1 = CBCMAC_f ( P1 || C1 xor P1)

Collection of DAGs 2 DAGs for each block len t : G_{2t} G_{2t+1} each DAG must have unique sink node each DAG must have at least t nodes each DAG individually non-singular – is that enough? NO

Incorrect Construction V1 V2V3 V4 V1 V2V3 V4 G_i cannot be allowed to be an induced subgraph of another G_j Define all graphs on the same set of vertices V

Requirements for VIL-PRF If for any pair of vertices (say u, v, u\=v) and graphs G_i and G_i, the set of incident nodes of u in G_i and v in G_i are same, then at least one incident edge is colored differently. –Non-singular over all graphs for each graph G_i, it is not the case that there is another graph G_i which is identical till the largest node of G_i

Optimizied VIL Mode col2col3 col4col5 col

Current Best Mode col2col3 col4col5 col col3

Parallel VIL mode v1 v2 v3 v2^n color5 color6 v1 v2 v3 v2^n color5 color6 col1 col2 col3 col4

Proof Most theorems involving PRF, PRP constructions, as well as Modes of Operations --- from smaller primitives --- have to tackle collisions in calls to the smaller primitive Modulo that, proving randomness is easy

Collisions in calls to oracle automatic collisions -- as in CBC-MAC Unforced collisions Forced collisions (adversarial, adaptive) –can try to prove there are no forced collisions –Fix last blocks of the transrcipt – visible to A –Conditioned on this, –On Average over all possible transcripts c, same as collisions in the transcript Thus, adversary left with playing automatic collisions

THE END