Collision resistant hash function
A hash function where it is hard for an adversary to find y: h(x) = h(y), given h(x) and y.
Strength of hardness assumptions
If violation of hardness assumption A implies violation of assumption B, A is weaker than B. Weaker assumptions are preferred.
To show weakness \htext{ }
Take poly time alg to break A and make poly time alg to break B whp.
Hierarchy of strength
Candidate one way functions
Easy to compute, hard (takes superpolynomial time) to invert whp. Often from computational number theory. Useful in key exchange.
One way functions based on Factoring
Hard core predicate h for one way functions F
No prob. polytime alg to predict output of h using F significantly better than random guessing, over U.
Group theoretic functions
Group G, generator g. In practice,
Number theoretic groups
For alg for finding large primes, see number theory ref. Can efficiently find generators \why.
Elliptic curve groups
See Topology ref.
The discrete log problem on elliptic curve groups is believed to be more difficult than in the underlying finite field’s multiplicative group. So shorter keys yield same security.
Discrete logarithm (DL)
Breaking: So, given a, p, g: find i.
Computational Diffie Hellman (CDH)
Pick a, b randomly from G.
Breaking: Given
Decisional Diffie Hellman
Pick a, b from G. Pick
Breaking: Given the Diffie Hellman tuple
Not secure if bilinear map efficiently computable.
Decisional linear assumption (DLA)
Decisional linear problem: Given group G of prime order p and elements\
Group with efficiently computable bilinear map e
Now adversary has access to p.
CDH assumed to be hard.
DDH is no longer hard: Given
Bilinear DDH (BDDH)
Extends DDH.
Breaking: Do this significantly better than random guessing:
Given
q-BDHE
Given
Can prove security (if
Information theoretic one way functions
Decoding random (n, k) linear codes. See Information and coding theory ref for details.
Assumptions from learning theory
Learning subspace with noise assumption. Weaker than LPN.
Learning partity with noise (LPN) assumed to be hard.
Lattice based cryptography
Does not assume hardness of factoring.
\tbc
Trapdoor one way function
One way function f which also has some trapdoor used to invert f.
RSA hardness assumption
p,q prime. N=pq. Given
Discrete cube root
Special case where e = 3.
Circuits to compute RSA fn: Iterated products problem
Multiply n n-bit numbers mod N. Computable by polynomial sized ckts of depth
Finding
Similarly, can compute ith output bit of BBS pseudorandom generator (see randomized algorithms ref).
Strong/ Flexible RSA assumption
Got N = pq, h; Find some