Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes Albrecht Petzoldt, Stanislav Bulygin and Johannes Buchmann TU Darmstadt,

Slides:



Advertisements
Similar presentations
Wheel of Fortune How to set up the game:
Advertisements

Asymptotically Optimal Communication for Torus- Based Cryptography David Woodruff MIT Joint work with Marten van Dijk Philips/MIT.
Hash Function Firewalls in Signature Schemes Burt Kaliski, RSA Laboratories IEEE P1363 Working Group Meeting June 2, 2000 (Rev. June 8, 2000)
A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics.
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
14. Aug Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware SAC 2013, Burnaby, Canada Thomas Pöppelmann and Tim Güneysu.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
1. 2 Gap-QS[O(1), ,2|  | -1 ] Gap-QS[O(n), ,2|  | -1 ] Gap-QS*[O(1),O(1), ,|  | -  ] Gap-QS*[O(1),O(1), ,|  | -  ] conjunctions of constant.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Authenticating streamed data in the presence of random packet loss March 17th, Philippe Golle, Stanford University.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Multivariate Methods of Data Analysis in Cosmic Ray Astrophysics A. Chilingarian, A. Vardanyan Cosmic Ray Division, Yerevan Physics Institute, Armenia.
ASYMMETRIC CIPHERS.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions J. Buchmann, E. Dahmen, A. Hülsing | TU Darmstadt |
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.
Chaos Theory and Encryption
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Yaomin Jin Design of Experiments Morris Method.
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Multivariate Signature Scheme using Quadratic Forms Takanori Yasuda (ISIT) Joint work with Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.)
Multivariate Signature Scheme using Quadratic Forms Takanori Yasuda (ISIT) Joint work with Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.)
Digital Signatures, Message Digest and Authentication Week-9.
Lecture 2: Introduction to Cryptography
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Prepared by Dr. Lamiaa Elshenawy
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
1 Signature scheme based on the root extraction problem over braid groups B.C. Wang, Y.P. Hu IET Information security 2009, Vol 3, Iss 2, pp
Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
| TU Darmstadt | Andreas Hülsing | 1 Optimal Parameters for XMSS MT Andreas Hülsing, Lea Rausch, and Johannes Buchmann.
COM 5336 Lecture 8 Digital Signatures
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Forward Secure Signatures on Smart Cards A. Hülsing, J. Buchmann, C. Busold | TU Darmstadt | A. Hülsing | 1.
| TU Darmstadt | Andreas Hülsing | 1 W-OTS + – Shorter Signatures for Hash-Based Signature Schemes Andreas Hülsing.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Wheel of Fortune How to set up the game:
Aesun Park1 , Kyung-Ah Shim2*, Namhun Koo2, and Dong-Guk Han1
Efficient CRT-Based RSA Cryptosystems
Wheel of Fortune How to set up the game:
XMSS Practical Hash-Based Signatures Andreas Hülsing joint work with Johannes Buchmann and Erik Dahmen | TU Darmstadt | Andreas Hülsing.
Wheel of Fortune How to set up the game:
Chapter 13 Digital Signature
CSC 774 Advanced Network Security
Presentation transcript:

Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes Albrecht Petzoldt, Stanislav Bulygin and Johannes Buchmann TU Darmstadt, Germany PQCrypto 2013 Limoges, France 05. June 2013

Outline 1.Motivation: Multivariate Cryptography 2.The UOV Signature Scheme 3.UOV Schemes with partially circulant Public Key 4.The Verification Process 5.Extension to Rainbow 6.Hybrid approach and Application to QUAD (  eprint) 7.Experiments and Results 8.Conclusion | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 2

Multivariate Cryptography | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 3 Problem MQ: Finding a vector such that is a hard task.

Multivariate Cryptography (2) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 4 Construction Start with an easily invertible quadratic map (central map) Combine it with two invertible affine maps and The public key is supposed to look like a random system

Multivariate Cryptography (3) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 5 Signature generation: For a hashvalue compute recursively, and. The signature of the document is. Signature verification: To verify the authenticity of a signature, one computes. If holds, the signature is accepted, otherwise rejected. Signature Schemes

Multivariate Cryptography (4) Advantages: Secure against attacks with quantum computers Great diversity of schemes and variations Enables fast en- and decryption as well as signature generation and verification Requires modest computational resources  Can be implemented on low cost smart cards | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 6

Multivariate Cryptography (5) Major Drawbacks Relatively young field of Research  Security is not so well understood No explicit parameter choices to meet given security levels known Large size of the public and private keys  Multivariate Cryptography is not yet widely spread | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 7

The UOV Signature Scheme  Two types of variables: Vinegar and Oil  Central map  Inversion of 1.Choose the Vinegar variables at random 2.Solve the resulting linear system for the Oil variables  Public Key: with an affine map.  Private Key:, | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 8 linear constant linear in O o equa- tions

Partially Circulant UOV Schemes           | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 9

Partially Circulant UOV Schemes (2) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 10

Partially Circulant UOV Schemes (2) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 11 linear terms

Partially Circulant UOV Schemes (2) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 12 linear terms

The verification process (1) Standard approach  Signature  Vector  Macauley matrix | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 13

The verification process (2) Alternative approach  extended signature vector  Matrix MP (k) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 14

Example (o,v)=(2,4) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 15 =( as 1, bs 1 +gs 2, cs 1 +hs 2 +ls 3, ds 1 +is 2 +ms 3 +ps 4, es 1 +js 2 +ns 3 +qs 4 + , fs 1 +ks 2 +os 3 +rs 4 + ,  ) (s 1, …, s 6,1) T = ( rs 1, as 1 +fs 2, bs 1 +gs 2 +ks 3, cs 1 +hs 2 +ls 3 +os 4, ds 1 +is 2 +ms 3 +ps 4 + , es 1 +js 2 +ns 3 +qs 4 + ,  ) (s 1, …, s 6,1) T

Extension to Rainbow | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 16  Several layers of Oil and Vinegar Use the same idea as for UOV for each Rainbow layer separately

Hybrid approach (  eprint)  Evaluate the structured part with the alternative approach and the random looking part with the standard approach UOV | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 17

Hybrid approach (2) Rainbow First layer | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 18

Hybrid approach (3) Rainbow Second layer | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 19

Application to QUAD (  eprint)  The systems and can be chosen partially circulant  Experiments indicate that this does not weaken the security of the scheme  Key stream generation can be sped up significantly | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 20

Experiments and Results (1) Public key size (kB) reduction factor Verification time (ms) Speed up factor UOV(256,28,56) (standard) cyclicUOV(256,28,56) (alternative) (hybrid) 5.5 UOV(31,33,66) (standard) cyclicUOV(31,33,66) (alternative) (hybrid) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 21 Implementation in C Lenovo ThinkPad, Intel Core 2Duo 2.53 GHz, 4 GB RAM

Experiments and Results (2) Public key size (kB) reduction factor Verification time (ms) Speed up factor Rainbow(256,17,13,13) (standard) cyclicRainbow (256,17,13,13) (alternative) (hybrid) 2.1 Rainbow(31,14,19,14) (standard) cyclicRainbow (31,14,19,14) (alternative) (hybrid) | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 22

Experiments and Results (3) Data throughput (kB/s) CPUcycles/byteSpeed up factor QUAD(16,30) ,265 cyclicQUAD(16,30) , QUAD(256,26) ,777 cyclicQUAD(256,26) , | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | 23

Conclusion Structured versions of UOV  Reduce public key size  Speed up the verification process  Technique can be extended to Rainbow and QUAD | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | kB 16.5 kB 0.98 ms 0.19 ms 15,777 cycles/byte 2,820 cycles/byte 0.26 ms 0.12 ms

Thank you for your attention | PQCrypto 2013 | Albrecht Petzoldt | TU Darmstadt | Questions? 0.98 ms 0.19 ms 0.26 ms 0.12 ms