symmetric encryption via keyrings and eccarcticcrypt.b.uib.no/files/2016/07/slides-rivest.pdf ·...

135
Symmetric Encryption via Keyrings and ECC Ronald L. Rivest Institute Professor MIT, Cambridge, MA ArcticCrypt 2016-07-18

Upload: others

Post on 10-Aug-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Symmetric Encryption via Keyrings and ECC

Ronald L. Rivest

Institute ProfessorMIT, Cambridge, MA

ArcticCrypt2016-07-18

Page 2: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Outline

Motivation—Simplifying Crypto Key UpdatesKeyring (Bag of Words) ModelIncremental Key UpdatesKeyring Issues

ResiliencePrior Work—Biometrics, Fuzziness, QuantumResilient Set VectorizationSecurity Analysis

Encrypting with keyringsError-correctionKeyring encryption detailsAttacks

Discussion

Page 3: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Motivation—Simplifying Key Updates

←→

Updating symmetric crypto keys is hard,because they:

I have high entropyI are not memorable, andI are updated “all-at-once” instead of

incrementally.Are there better (non-PK) methods?

Page 4: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Motivation—Simplifying Key Updates

←→

Updating symmetric crypto keys is hard,because they:I have high entropy

I are not memorable, andI are updated “all-at-once” instead of

incrementally.Are there better (non-PK) methods?

Page 5: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Motivation—Simplifying Key Updates

←→

Updating symmetric crypto keys is hard,because they:I have high entropyI are not memorable, and

I are updated “all-at-once” instead ofincrementally.

Are there better (non-PK) methods?

Page 6: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Motivation—Simplifying Key Updates

←→

Updating symmetric crypto keys is hard,because they:I have high entropyI are not memorable, andI are updated “all-at-once” instead of

incrementally.

Are there better (non-PK) methods?

Page 7: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Motivation—Simplifying Key Updates

←→

Updating symmetric crypto keys is hard,because they:I have high entropyI are not memorable, andI are updated “all-at-once” instead of

incrementally.Are there better (non-PK) methods?

Page 8: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring (Bag of Words) ModelMain idea: Key is a “bag of words” agreed uponby sender and receiver. (Really “set” not “bag”(multiset).)

Page 9: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyrings

I Each word is a keyword.

I Bag is a keyring.I Separate keyring for each

sender/receiver pair.I Sender and receiver have

identical (or nearly identical)keyrings.

I Maybe 10–100 keywords ona keyring.

Page 10: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyrings

I Each word is a keyword.I Bag is a keyring.

I Separate keyring for eachsender/receiver pair.

I Sender and receiver haveidentical (or nearly identical)keyrings.

I Maybe 10–100 keywords ona keyring.

Page 11: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyrings

I Each word is a keyword.I Bag is a keyring.I Separate keyring for each

sender/receiver pair.

I Sender and receiver haveidentical (or nearly identical)keyrings.

I Maybe 10–100 keywords ona keyring.

Page 12: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyrings

I Each word is a keyword.I Bag is a keyring.I Separate keyring for each

sender/receiver pair.I Sender and receiver have

identical (or nearly identical)keyrings.

I Maybe 10–100 keywords ona keyring.

Page 13: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyrings

I Each word is a keyword.I Bag is a keyring.I Separate keyring for each

sender/receiver pair.I Sender and receiver have

identical (or nearly identical)keyrings.

I Maybe 10–100 keywords ona keyring.

Page 14: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Incremental Key Updates Are Simple

Alice says privately to Bob:I Let’s add “garlic” to our keyring.

I Let’s delete “mustard” from our keyring.I Let’s add all words from your last two tweets.I Let’s add words of a quote:

“It is a miracle that curiosity survivesformal education.”

(Albert Einstein)

I Let’s delete all keywords added in 2015.

Page 15: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Incremental Key Updates Are Simple

Alice says privately to Bob:I Let’s add “garlic” to our keyring.I Let’s delete “mustard” from our keyring.

I Let’s add all words from your last two tweets.I Let’s add words of a quote:

“It is a miracle that curiosity survivesformal education.”

(Albert Einstein)

I Let’s delete all keywords added in 2015.

Page 16: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Incremental Key Updates Are Simple

Alice says privately to Bob:I Let’s add “garlic” to our keyring.I Let’s delete “mustard” from our keyring.I Let’s add all words from your last two tweets.

I Let’s add words of a quote:

“It is a miracle that curiosity survivesformal education.”

(Albert Einstein)

I Let’s delete all keywords added in 2015.

Page 17: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Incremental Key Updates Are Simple

Alice says privately to Bob:I Let’s add “garlic” to our keyring.I Let’s delete “mustard” from our keyring.I Let’s add all words from your last two tweets.I Let’s add words of a quote:

“It is a miracle that curiosity survivesformal education.”

(Albert Einstein)

I Let’s delete all keywords added in 2015.

Page 18: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Incremental Key Updates Are Simple

Alice says privately to Bob:I Let’s add “garlic” to our keyring.I Let’s delete “mustard” from our keyring.I Let’s add all words from your last two tweets.I Let’s add words of a quote:

“It is a miracle that curiosity survivesformal education.”

(Albert Einstein)

I Let’s delete all keywords added in 2015.

Page 19: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Incremental Key Updates Are Simple

Alice says privately to Bob:I Let’s add “garlic” to our keyring.I Let’s delete “mustard” from our keyring.I Let’s add all words from your last two tweets.I Let’s add words of a quote:

“It is a miracle that curiosity survivesformal education.”

(Albert Einstein)

I Let’s delete all keywords added in 2015.

Page 20: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Scenario

key = 0x47a31...f3

key = 0x47a31...f3

Page 21: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Scenario

key = 0x47a31...f3

key = 0x47a31...f3

Page 22: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Scenario

key = 0x47a31...f3

key = 0x47a31...f3

Page 23: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring Issues

I (Resilience) How to make encryption workeven if Alice and Bob’s keyrings are slightly“out of sync”?

I (Keying) How to use a “bag of words” as asymmetric crypto key?

I (Security) How to keep adversary frombreaking in and then “tracking” keyringevolution?

Page 24: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring Issues

I (Resilience) How to make encryption workeven if Alice and Bob’s keyrings are slightly“out of sync”?

I (Keying) How to use a “bag of words” as asymmetric crypto key?

I (Security) How to keep adversary frombreaking in and then “tracking” keyringevolution?

Page 25: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring Issues

I (Resilience) How to make encryption workeven if Alice and Bob’s keyrings are slightly“out of sync”?

I (Keying) How to use a “bag of words” as asymmetric crypto key?

I (Security) How to keep adversary frombreaking in and then “tracking” keyringevolution?

Page 26: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilience

We want that a ciphertext made using keyring Acan be decrypted using different keyring B, aslong as A and B are “close”.

Two metrics of interest:I Set distance. (Relative) size of set

difference. That is, |A⊕B| or |A⊕B|/|A∪B|.I Hamming distance. (Relative) number of

positions in which vectors x and y differ.We describe a nice way of converting from thefirst to the second.

Page 27: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilience

We want that a ciphertext made using keyring Acan be decrypted using different keyring B, aslong as A and B are “close”.Two metrics of interest:

I Set distance. (Relative) size of setdifference. That is, |A⊕B| or |A⊕B|/|A∪B|.

I Hamming distance. (Relative) number ofpositions in which vectors x and y differ.

We describe a nice way of converting from thefirst to the second.

Page 28: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilience

We want that a ciphertext made using keyring Acan be decrypted using different keyring B, aslong as A and B are “close”.Two metrics of interest:I Set distance. (Relative) size of set

difference. That is, |A⊕B| or |A⊕B|/|A∪B|.

I Hamming distance. (Relative) number ofpositions in which vectors x and y differ.

We describe a nice way of converting from thefirst to the second.

Page 29: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilience

We want that a ciphertext made using keyring Acan be decrypted using different keyring B, aslong as A and B are “close”.Two metrics of interest:I Set distance. (Relative) size of set

difference. That is, |A⊕B| or |A⊕B|/|A∪B|.I Hamming distance. (Relative) number of

positions in which vectors x and y differ.

We describe a nice way of converting from thefirst to the second.

Page 30: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilience

We want that a ciphertext made using keyring Acan be decrypted using different keyring B, aslong as A and B are “close”.Two metrics of interest:I Set distance. (Relative) size of set

difference. That is, |A⊕B| or |A⊕B|/|A∪B|.I Hamming distance. (Relative) number of

positions in which vectors x and y differ.We describe a nice way of converting from thefirst to the second.

Page 31: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Biometrics: Use a fingerprint as key

Our problem is not particularly new...

Similar to the problem of encrypting a key with abiometric; biometric features ∼ keywords.

Page 32: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Biometrics: Use a fingerprint as key

Our problem is not particularly new...Similar to the problem of encrypting a key with abiometric; biometric features ∼ keywords.

Page 33: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Fuzziness everywhere

I Juels/Wattenberg 1999 “A FuzzyCommitment Scheme”. Introduces“code-offset” construction.

I Juels/Sudan 2006 “A Fuzzy Vault Scheme”Based on clever use of interpolation.

I Dodis/Ostrovsky/Reyzin/Smith 2004“Fuzzy Extractors: How to Generate StrongKeys from Biometrics and Other Noisy Data”Relates ‘secure sketches” and fuzzyextractors. (Also: Dodis/Reyzin/Smith 2007“Fuzzy Extractors”)

I Sahai/Waters 2005 “Fuzzy IBE”. Fuzzy PKscheme.

Page 34: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Fuzziness everywhere

I Juels/Wattenberg 1999 “A FuzzyCommitment Scheme”. Introduces“code-offset” construction.

I Juels/Sudan 2006 “A Fuzzy Vault Scheme”Based on clever use of interpolation.

I Dodis/Ostrovsky/Reyzin/Smith 2004“Fuzzy Extractors: How to Generate StrongKeys from Biometrics and Other Noisy Data”Relates ‘secure sketches” and fuzzyextractors. (Also: Dodis/Reyzin/Smith 2007“Fuzzy Extractors”)

I Sahai/Waters 2005 “Fuzzy IBE”. Fuzzy PKscheme.

Page 35: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Fuzziness everywhere

I Juels/Wattenberg 1999 “A FuzzyCommitment Scheme”. Introduces“code-offset” construction.

I Juels/Sudan 2006 “A Fuzzy Vault Scheme”Based on clever use of interpolation.

I Dodis/Ostrovsky/Reyzin/Smith 2004“Fuzzy Extractors: How to Generate StrongKeys from Biometrics and Other Noisy Data”Relates ‘secure sketches” and fuzzyextractors. (Also: Dodis/Reyzin/Smith 2007“Fuzzy Extractors”)

I Sahai/Waters 2005 “Fuzzy IBE”. Fuzzy PKscheme.

Page 36: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Fuzziness everywhere

I Juels/Wattenberg 1999 “A FuzzyCommitment Scheme”. Introduces“code-offset” construction.

I Juels/Sudan 2006 “A Fuzzy Vault Scheme”Based on clever use of interpolation.

I Dodis/Ostrovsky/Reyzin/Smith 2004“Fuzzy Extractors: How to Generate StrongKeys from Biometrics and Other Noisy Data”Relates ‘secure sketches” and fuzzyextractors. (Also: Dodis/Reyzin/Smith 2007“Fuzzy Extractors”)

I Sahai/Waters 2005 “Fuzzy IBE”. Fuzzy PKscheme.

Page 37: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

PinSketch[DORS04]

I Uses BCH ECC with algorithms that workefficiently on sparse vectors.

I Message transmitted has length δ overGF (2α), where 2α ≥ |U| and U is universe ofkeys, and where δ is upper bound on thesize of the set difference A⊕ B.

I Allows recipient to reconstruct A.

Page 38: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Quantum Key Distribution

I Bennet Brassard 1984“Quantum cryptography: Public keydistribution and coin tossing”Information reconciliation by publicdiscussion over a classical channel.

Page 39: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilient Set VectorizationA set vectorizer φ takes as input a set A, aninteger n, and a nonce N, and produces asoutput a uniformly chosen (over the choice ofnonce) vector from An.A resilient set vectorizer is a set vectorizerwith the property that for any two sets A and Bwith |A ∩ B| = p · |A ∪ B| (for some p,0 ≤ p ≤ 1), we have

d(φ(A,n,N), φ(B,n,N)) ∼ n − Bin(n,p) .

That is, if a fraction p of A ∪ B are shared, thenthe fraction of positions where φ(A,n,N) andφ(B,n,N) agree follows the binomial distributionwith mean np.

Page 40: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game (≡ RSV with n = 1)

I Alice and Bob agree on a strategy.

I Alice is given an arbitrary keyring A.I Bob is given an arbitrary keyring B.I They are told sizes of A, B, A ∩ B, A ∪ B, U .I They are given the same random nonce N.I Alice and Bob separately each pick one

element from their keyrings.I What is the maximum probability that they

pick the same element, using optimalstrategy?

Page 41: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game (≡ RSV with n = 1)

I Alice and Bob agree on a strategy.I Alice is given an arbitrary keyring A.

I Bob is given an arbitrary keyring B.I They are told sizes of A, B, A ∩ B, A ∪ B, U .I They are given the same random nonce N.I Alice and Bob separately each pick one

element from their keyrings.I What is the maximum probability that they

pick the same element, using optimalstrategy?

Page 42: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game (≡ RSV with n = 1)

I Alice and Bob agree on a strategy.I Alice is given an arbitrary keyring A.I Bob is given an arbitrary keyring B.

I They are told sizes of A, B, A ∩ B, A ∪ B, U .I They are given the same random nonce N.I Alice and Bob separately each pick one

element from their keyrings.I What is the maximum probability that they

pick the same element, using optimalstrategy?

Page 43: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game (≡ RSV with n = 1)

I Alice and Bob agree on a strategy.I Alice is given an arbitrary keyring A.I Bob is given an arbitrary keyring B.I They are told sizes of A, B, A ∩ B, A ∪ B, U .

I They are given the same random nonce N.I Alice and Bob separately each pick one

element from their keyrings.I What is the maximum probability that they

pick the same element, using optimalstrategy?

Page 44: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game (≡ RSV with n = 1)

I Alice and Bob agree on a strategy.I Alice is given an arbitrary keyring A.I Bob is given an arbitrary keyring B.I They are told sizes of A, B, A ∩ B, A ∪ B, U .I They are given the same random nonce N.

I Alice and Bob separately each pick oneelement from their keyrings.

I What is the maximum probability that theypick the same element, using optimalstrategy?

Page 45: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game (≡ RSV with n = 1)

I Alice and Bob agree on a strategy.I Alice is given an arbitrary keyring A.I Bob is given an arbitrary keyring B.I They are told sizes of A, B, A ∩ B, A ∪ B, U .I They are given the same random nonce N.I Alice and Bob separately each pick one

element from their keyrings.

I What is the maximum probability that theypick the same element, using optimalstrategy?

Page 46: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game (≡ RSV with n = 1)

I Alice and Bob agree on a strategy.I Alice is given an arbitrary keyring A.I Bob is given an arbitrary keyring B.I They are told sizes of A, B, A ∩ B, A ∪ B, U .I They are given the same random nonce N.I Alice and Bob separately each pick one

element from their keyrings.I What is the maximum probability that they

pick the same element, using optimalstrategy?

Page 47: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Simplest interesting example

|A| = 2 |A ∩ B| = 1 |B| = 2 |U| = 3

CAT DOG RAT

Alice sees:

N = 3762134912

Bob sees:

Should Alice pick CAT or DOG?

Should Bob pick DOG or RAT?

Agree with prob 1/4? 1/3? 1/2?...

Page 48: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Simplest interesting example

|A| = 2 |A ∩ B| = 1 |B| = 2 |U| = 3

CAT DOG RAT

Alice sees:

N = 3762134912

Bob sees:

Should Alice pick CAT or DOG?

Should Bob pick DOG or RAT?

Agree with prob 1/4? 1/3? 1/2?...

Page 49: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Simplest interesting example

|A| = 2 |A ∩ B| = 1 |B| = 2 |U| = 3

CAT DOG RAT

Alice sees:

N = 3762134912

Bob sees:

Should Alice pick CAT or DOG?

Should Bob pick DOG or RAT?

Agree with prob 1/4? 1/3? 1/2?...

Page 50: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Simplest interesting example

|A| = 2 |A ∩ B| = 1 |B| = 2 |U| = 3

CAT DOG RAT

Alice sees:

N = 3762134912

Bob sees:

Should Alice pick CAT or DOG?

Should Bob pick DOG or RAT?

Agree with prob 1/4? 1/3? 1/2?...

Page 51: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Simplest interesting example

|A| = 2 |A ∩ B| = 1 |B| = 2 |U| = 3

CAT DOG RAT

Alice sees:

N = 3762134912

Bob sees:

Should Alice pick CAT or DOG?

Should Bob pick DOG or RAT?

Agree with prob 1/4? 1/3? 1/2?...

Page 52: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game – Random Strategy

I If Alice and Bob make their choicesindependently at random, then they matchwith probability

|A ∩ B|/|A| |B| .

I (Pretty small, especially when A and B arelarge.)

Page 53: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game – Random Strategy

I If Alice and Bob make their choicesindependently at random, then they matchwith probability

|A ∩ B|/|A| |B| .

I (Pretty small, especially when A and B arelarge.)

Page 54: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game for |A ∩ B| = 1

Brute-force searches for optimal strategies(surprisingly) suggested the following

TheoremWhen |A ∩ B| = 1 and A ∪ B = U the optimummatch probability is at least

1/max(|A|, |B|) .

Proof: (at end). �Exercise: Find such an optimal strategy for ourexample that matches with probability 1/2.But |A ∩ B| = 1 and A ∪ B = U are unrealistic...

Page 55: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game for |A ∩ B| = 1

Brute-force searches for optimal strategies(surprisingly) suggested the following

TheoremWhen |A ∩ B| = 1 and A ∪ B = U the optimummatch probability is at least

1/max(|A|, |B|) .

Proof: (at end). �

Exercise: Find such an optimal strategy for ourexample that matches with probability 1/2.But |A ∩ B| = 1 and A ∪ B = U are unrealistic...

Page 56: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game for |A ∩ B| = 1

Brute-force searches for optimal strategies(surprisingly) suggested the following

TheoremWhen |A ∩ B| = 1 and A ∪ B = U the optimummatch probability is at least

1/max(|A|, |B|) .

Proof: (at end). �Exercise: Find such an optimal strategy for ourexample that matches with probability 1/2.

But |A ∩ B| = 1 and A ∪ B = U are unrealistic...

Page 57: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game for |A ∩ B| = 1

Brute-force searches for optimal strategies(surprisingly) suggested the following

TheoremWhen |A ∩ B| = 1 and A ∪ B = U the optimummatch probability is at least

1/max(|A|, |B|) .

Proof: (at end). �Exercise: Find such an optimal strategy for ourexample that matches with probability 1/2.But |A ∩ B| = 1 and A ∪ B = U are unrealistic...

Page 58: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Jaccard Index of Similarity

I The Jaccard similarity coefficient J(A,B)measures the similarity of two sets A and B:

J(A,B) =|A ∩ B||A ∪ B|

.

I It can be estimated using the MinHashmethod (Broder 1997): Construct n randomhash functions mapping elements to realvalues. Compute the fraction f of themhaving the same minimum in A as in B. Then

E(f ) = J(A,B) .

Page 59: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Jaccard Index of Similarity

I The Jaccard similarity coefficient J(A,B)measures the similarity of two sets A and B:

J(A,B) =|A ∩ B||A ∪ B|

.

I It can be estimated using the MinHashmethod (Broder 1997): Construct n randomhash functions mapping elements to realvalues. Compute the fraction f of themhaving the same minimum in A as in B. Then

E(f ) = J(A,B) .

Page 60: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game via MinHash

TheoremAlice and Bob can always win with probability atleast p = J(A,B) = |A ∩ B|/|A ∪ B| .

Proof.I Initially, Alice and Bob agree on a random

hash function h.I They each pick their keyword with minimum

hash-value.I They win if one of their shared keywords has

the smallest hash value in both sets.

Conjecture: The MinHash strategy isoptimal for |A ∩ B| > 1.

Page 61: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game via MinHash

TheoremAlice and Bob can always win with probability atleast p = J(A,B) = |A ∩ B|/|A ∪ B| .

Proof.I Initially, Alice and Bob agree on a random

hash function h.I They each pick their keyword with minimum

hash-value.I They win if one of their shared keywords has

the smallest hash value in both sets.

Conjecture: The MinHash strategy isoptimal for |A ∩ B| > 1.

Page 62: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyword Matching Game via MinHash

TheoremAlice and Bob can always win with probability atleast p = J(A,B) = |A ∩ B|/|A ∪ B| .

Proof.I Initially, Alice and Bob agree on a random

hash function h.I They each pick their keyword with minimum

hash-value.I They win if one of their shared keywords has

the smallest hash value in both sets.

Conjecture: The MinHash strategy isoptimal for |A ∩ B| > 1.

Page 63: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilient Set Vectorization (RSV)Alice iterates the MinHash method (with nrandom hash functions), to create a keywordvector

W = φ(A,n,N) = (W1,W2, . . . ,Wn)

of some desired length n.

Bob (using same hashes) similarly creates akeyword vector W ′.Let z denote the number of positions in whichW and W ′ agree, and let p = J(A,B). Then(under ROM)

z ∼ Bin(n,p),

so E(z) = np and σ(z) =√

np(1− p).

Page 64: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilient Set Vectorization (RSV)Alice iterates the MinHash method (with nrandom hash functions), to create a keywordvector

W = φ(A,n,N) = (W1,W2, . . . ,Wn)

of some desired length n.Bob (using same hashes) similarly creates akeyword vector W ′.

Let z denote the number of positions in whichW and W ′ agree, and let p = J(A,B). Then(under ROM)

z ∼ Bin(n,p),

so E(z) = np and σ(z) =√

np(1− p).

Page 65: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Resilient Set Vectorization (RSV)Alice iterates the MinHash method (with nrandom hash functions), to create a keywordvector

W = φ(A,n,N) = (W1,W2, . . . ,Wn)

of some desired length n.Bob (using same hashes) similarly creates akeyword vector W ′.Let z denote the number of positions in whichW and W ′ agree, and let p = J(A,B). Then(under ROM)

z ∼ Bin(n,p),

so E(z) = np and σ(z) =√

np(1− p).

Page 66: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Security Analysis Setup

Suppose we can arrange things so that Bob canalways decrypt Alice’s ciphertext if

z ≥ 3n/4 .

Suppose further we can arrange things so thatthe Adversary can’t decrypt Alice’s ciphertext ifthe number z ′ of positions of W it knows (orguesses) correctly satisfies

z ′ < n/2 .

Page 67: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Security Analysis Setup

Suppose we can arrange things so that Bob canalways decrypt Alice’s ciphertext if

z ≥ 3n/4 .

Suppose further we can arrange things so thatthe Adversary can’t decrypt Alice’s ciphertext ifthe number z ′ of positions of W it knows (orguesses) correctly satisfies

z ′ < n/2 .

Page 68: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the good guys

I Suppose Alice and Bob have

p = J(A,B) = 0.90 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key, where n = 256.

I Bob’s vector φ(B,n,N) agrees withφ(A,n,N) in z positions.

I If z ≥ 192, Bob can decrypt the message.I Bob fails to decrypt with near-zero

probability:

Prob (z < 192) = 1.5× 10−12 .

Page 69: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the good guys

I Suppose Alice and Bob have

p = J(A,B) = 0.90 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key, where n = 256.

I Bob’s vector φ(B,n,N) agrees withφ(A,n,N) in z positions.

I If z ≥ 192, Bob can decrypt the message.I Bob fails to decrypt with near-zero

probability:

Prob (z < 192) = 1.5× 10−12 .

Page 70: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the good guys

I Suppose Alice and Bob have

p = J(A,B) = 0.90 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key, where n = 256.

I Bob’s vector φ(B,n,N) agrees withφ(A,n,N) in z positions.

I If z ≥ 192, Bob can decrypt the message.I Bob fails to decrypt with near-zero

probability:

Prob (z < 192) = 1.5× 10−12 .

Page 71: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the good guys

I Suppose Alice and Bob have

p = J(A,B) = 0.90 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key, where n = 256.

I Bob’s vector φ(B,n,N) agrees withφ(A,n,N) in z positions.

I If z ≥ 192, Bob can decrypt the message.

I Bob fails to decrypt with near-zeroprobability:

Prob (z < 192) = 1.5× 10−12 .

Page 72: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the good guys

I Suppose Alice and Bob have

p = J(A,B) = 0.90 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key, where n = 256.

I Bob’s vector φ(B,n,N) agrees withφ(A,n,N) in z positions.

I If z ≥ 192, Bob can decrypt the message.I Bob fails to decrypt with near-zero

probability:

Prob (z < 192) = 1.5× 10−12 .

Page 73: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the AdversaryI Suppose Adversary knows (or guesses) Q, a

set of 1/4 of Alice’s keyring A, so

p′ = J(A,Q) = 0.25 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key; Adversary overhearsciphertext.

I Adversary’s vector φ(Q,n,N) agrees withAlice’s in z ′ positions.

I If z ′ ≥ 128, Adversary can decrypt message.I But Adversary fails almost certainly, since

Prob (z ′ ≥ 128) = 7.5× 10−18 .

Page 74: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the AdversaryI Suppose Adversary knows (or guesses) Q, a

set of 1/4 of Alice’s keyring A, so

p′ = J(A,Q) = 0.25 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key; Adversary overhearsciphertext.

I Adversary’s vector φ(Q,n,N) agrees withAlice’s in z ′ positions.

I If z ′ ≥ 128, Adversary can decrypt message.I But Adversary fails almost certainly, since

Prob (z ′ ≥ 128) = 7.5× 10−18 .

Page 75: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the AdversaryI Suppose Adversary knows (or guesses) Q, a

set of 1/4 of Alice’s keyring A, so

p′ = J(A,Q) = 0.25 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key; Adversary overhearsciphertext.

I Adversary’s vector φ(Q,n,N) agrees withAlice’s in z ′ positions.

I If z ′ ≥ 128, Adversary can decrypt message.I But Adversary fails almost certainly, since

Prob (z ′ ≥ 128) = 7.5× 10−18 .

Page 76: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the AdversaryI Suppose Adversary knows (or guesses) Q, a

set of 1/4 of Alice’s keyring A, so

p′ = J(A,Q) = 0.25 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key; Adversary overhearsciphertext.

I Adversary’s vector φ(Q,n,N) agrees withAlice’s in z ′ positions.

I If z ′ ≥ 128, Adversary can decrypt message.

I But Adversary fails almost certainly, since

Prob (z ′ ≥ 128) = 7.5× 10−18 .

Page 77: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Analysis–for the AdversaryI Suppose Adversary knows (or guesses) Q, a

set of 1/4 of Alice’s keyring A, so

p′ = J(A,Q) = 0.25 .

I Alice encrypts a message to Bob usingφ(A,n,N) as a key; Adversary overhearsciphertext.

I Adversary’s vector φ(Q,n,N) agrees withAlice’s in z ′ positions.

I If z ′ ≥ 128, Adversary can decrypt message.I But Adversary fails almost certainly, since

Prob (z ′ ≥ 128) = 7.5× 10−18 .

Page 78: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Error Correction

I An (n, k) Reed-Solomon code has kinformation symbols and codewords oflength n.

I Bob can efficiently correct up to (n − k)/2errors and always obtain a uniquedecoding.

I With list decoding Adversary can efficientlycorrect up to (n − k) errors (and obtain asmall number of possible decodings).

k n − k

Page 79: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Error Correction

I An (n, k) Reed-Solomon code has kinformation symbols and codewords oflength n.

I Bob can efficiently correct up to (n − k)/2errors and always obtain a uniquedecoding.

I With list decoding Adversary can efficientlycorrect up to (n − k) errors (and obtain asmall number of possible decodings).

k n − k

Page 80: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Error Correction

I An (n, k) Reed-Solomon code has kinformation symbols and codewords oflength n.

I Bob can efficiently correct up to (n − k)/2errors and always obtain a uniquedecoding.

I With list decoding Adversary can efficientlycorrect up to (n − k) errors (and obtain asmall number of possible decodings).

k n − k

Page 81: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (N1,N2,N3), Y , C, and T .

Page 82: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (N1,N2,N3), Y , C, and T .

Page 83: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends

(N1,N2,N3), Y ,

C, and T .

Page 84: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (

N1,N2,

N3),

Y ,

C, and T .

Page 85: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (

N1,N2,

N3),

Y ,

C, and T .

Page 86: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (N1,

N2,

N3),

Y ,

C, and T .

Page 87: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (N1,

N2,

N3),

Y ,

C, and T .

Page 88: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (N1,

N2,

N3), Y , C, and T .

Page 89: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 Wn

N2+1 N2+n

Alice sends (N1,

N2,

N3), Y , C, and T .

Page 90: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Keyring proposal for encrypting M with keyring A

M

A

K1 Kk

AE

C T

N3

RSV

W1 Wn

N1

ECC

X1 Xn

E E

Y1 Yn

W1 WnN2+1 N2+n

Alice sends (N1,N2,N3), Y , C, and T .

Page 91: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute nonces, K , C, T

I Choose random nonces N1, N2, N3.

I Choose n and k (e.g. n = 256, k = 128) andbyte size (GF (28)).

I Choose random k -byte message keyK1, . . . ,Kk (aka “vault contents”).

I Encrypt message M with key K and nonceN3 using an authenticated encryptionmethod to obtain ciphertext C andauthentication tag T .

Page 92: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute nonces, K , C, T

I Choose random nonces N1, N2, N3.I Choose n and k (e.g. n = 256, k = 128) and

byte size (GF (28)).

I Choose random k -byte message keyK1, . . . ,Kk (aka “vault contents”).

I Encrypt message M with key K and nonceN3 using an authenticated encryptionmethod to obtain ciphertext C andauthentication tag T .

Page 93: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute nonces, K , C, T

I Choose random nonces N1, N2, N3.I Choose n and k (e.g. n = 256, k = 128) and

byte size (GF (28)).I Choose random k -byte message key

K1, . . . ,Kk (aka “vault contents”).

I Encrypt message M with key K and nonceN3 using an authenticated encryptionmethod to obtain ciphertext C andauthentication tag T .

Page 94: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute nonces, K , C, T

I Choose random nonces N1, N2, N3.I Choose n and k (e.g. n = 256, k = 128) and

byte size (GF (28)).I Choose random k -byte message key

K1, . . . ,Kk (aka “vault contents”).I Encrypt message M with key K and nonce

N3 using an authenticated encryptionmethod to obtain ciphertext C andauthentication tag T .

Page 95: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute W , X , and Y

I Compute keyword vector W = φ(A,n,N1).

I Reed-Solomon-encode key to give n-byteencoded key X1, . . . ,Xn.

I Use each keyword vector element Wi as keyto encrypt each encoded key byte Xi :

Yi = E(Wi ,Xi ,N2 + i)

use small-domain encryption tweakableencryption method like “swap-or-not”(Hoang-Morris-Rogaway14).

I Send (N1,N2,N3),Y ,C,T .

Page 96: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute W , X , and Y

I Compute keyword vector W = φ(A,n,N1).I Reed-Solomon-encode key to give n-byte

encoded key X1, . . . ,Xn.

I Use each keyword vector element Wi as keyto encrypt each encoded key byte Xi :

Yi = E(Wi ,Xi ,N2 + i)

use small-domain encryption tweakableencryption method like “swap-or-not”(Hoang-Morris-Rogaway14).

I Send (N1,N2,N3),Y ,C,T .

Page 97: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute W , X , and Y

I Compute keyword vector W = φ(A,n,N1).I Reed-Solomon-encode key to give n-byte

encoded key X1, . . . ,Xn.I Use each keyword vector element Wi as key

to encrypt each encoded key byte Xi :

Yi = E(Wi ,Xi ,N2 + i)

use small-domain encryption tweakableencryption method like “swap-or-not”(Hoang-Morris-Rogaway14).

I Send (N1,N2,N3),Y ,C,T .

Page 98: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Compute W , X , and Y

I Compute keyword vector W = φ(A,n,N1).I Reed-Solomon-encode key to give n-byte

encoded key X1, . . . ,Xn.I Use each keyword vector element Wi as key

to encrypt each encoded key byte Xi :

Yi = E(Wi ,Xi ,N2 + i)

use small-domain encryption tweakableencryption method like “swap-or-not”(Hoang-Morris-Rogaway14).

I Send (N1,N2,N3),Y ,C,T .

Page 99: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Decrypting (N1,N2,N3),Y ,C,T with keyring B

M

B

K1 Kk

AE

C T

N3

RSV

W ′1 W ′

n

N1

ECC

X1 Xn

D D

Y1 Yn

W ′1 W ′

nN2+1 N2+n

Bob receives (N1,N2,N3), Y , C, and T .

Page 100: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Decrypting (N1,N2,N3),Y ,C,T with keyring B

M

B

K1 Kk

AE

C T

N3

RSV

W ′1 W ′

n

N1

ECC

X1 Xn

D D

Y1 Yn

W ′1 W ′

nN2+1 N2+n

Bob receives (N1,N2,N3), Y , C, and T .

Page 101: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Decrypting (N1,N2,N3),Y ,C,T with keyring B

M

B

K1 Kk

AE

C T

N3

RSV

W ′1 W ′

n

N1

ECC

X1 Xn

D D

Y1 Yn

W ′1 W ′

nN2+1 N2+n

Bob receives (N1,N2,N3), Y , C, and T .

Page 102: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Decrypting (N1,N2,N3),Y ,C,T with keyring B

M

B

K1 Kk

AE

C T

N3

RSV

W ′1 W ′

n

N1

ECC

X1 Xn

D D

Y1 Yn

W ′1 W ′

nN2+1 N2+n

Bob receives (N1,N2,N3), Y , C, and T .

Page 103: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Decrypting (N1,N2,N3),Y ,C,T with keyring B

M

B

K1 Kk

AE

C T

N3

RSV

W ′1 W ′

n

N1

ECC

X1 Xn

D D

Y1 Yn

W ′1 W ′

nN2+1 N2+n

Bob receives (N1,N2,N3), Y , C, and T .

Page 104: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 1: Guessing large subset of A

I Adversary may try to guess a large subset ofA.

I Difficulty depends on A. Even if |U| = 4096and |A| = 24 (chosen uniformly), guessing a12-word subset of A has chance(

2412

)/

(4096

12

)≈ 2−94

of success.I Using keyrings may invite poor choices (just

as passwords tend to be poor). “Biometric”keyrings don’t have this problem.

I Initial keywords may be high-entropy.

Page 105: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 1: Guessing large subset of A

I Adversary may try to guess a large subset ofA.

I Difficulty depends on A. Even if |U| = 4096and |A| = 24 (chosen uniformly), guessing a12-word subset of A has chance(

2412

)/

(4096

12

)≈ 2−94

of success.

I Using keyrings may invite poor choices (justas passwords tend to be poor). “Biometric”keyrings don’t have this problem.

I Initial keywords may be high-entropy.

Page 106: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 1: Guessing large subset of A

I Adversary may try to guess a large subset ofA.

I Difficulty depends on A. Even if |U| = 4096and |A| = 24 (chosen uniformly), guessing a12-word subset of A has chance(

2412

)/

(4096

12

)≈ 2−94

of success.I Using keyrings may invite poor choices (just

as passwords tend to be poor). “Biometric”keyrings don’t have this problem.

I Initial keywords may be high-entropy.

Page 107: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 1: Guessing large subset of A

I Adversary may try to guess a large subset ofA.

I Difficulty depends on A. Even if |U| = 4096and |A| = 24 (chosen uniformly), guessing a12-word subset of A has chance(

2412

)/

(4096

12

)≈ 2−94

of success.I Using keyrings may invite poor choices (just

as passwords tend to be poor). “Biometric”keyrings don’t have this problem.

I Initial keywords may be high-entropy.

Page 108: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 2: Stealing A, then tracking its evolution

I Stealing A, then tracking its evolution ifupdates are small.

I Make updates large every once in a while!I Reminiscent of problems of refreshing

entropy pool in PRNG.(Ferguson-Schneier-Kohn’10, Dodis-Shamir-StephensDavidowitz-Wich’14).

Page 109: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 2: Stealing A, then tracking its evolution

I Stealing A, then tracking its evolution ifupdates are small.

I Make updates large every once in a while!

I Reminiscent of problems of refreshingentropy pool in PRNG.(Ferguson-Schneier-Kohn’10, Dodis-Shamir-StephensDavidowitz-Wich’14).

Page 110: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 2: Stealing A, then tracking its evolution

I Stealing A, then tracking its evolution ifupdates are small.

I Make updates large every once in a while!I Reminiscent of problems of refreshing

entropy pool in PRNG.(Ferguson-Schneier-Kohn’10, Dodis-Shamir-StephensDavidowitz-Wich’14).

Page 111: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 3: Playing Matching Game better

I We only conjectured that MinHash strategywas best way to play Keyword MatchingGame.

I Perhaps Adversary can play this game betterthan Bob can, even for a fixed strategy byAlice!

I We need to prove that MinHash strategy isoptimal (for |A ∩ B| > 1)!

Page 112: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 3: Playing Matching Game better

I We only conjectured that MinHash strategywas best way to play Keyword MatchingGame.

I Perhaps Adversary can play this game betterthan Bob can, even for a fixed strategy byAlice!

I We need to prove that MinHash strategy isoptimal (for |A ∩ B| > 1)!

Page 113: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 3: Playing Matching Game better

I We only conjectured that MinHash strategywas best way to play Keyword MatchingGame.

I Perhaps Adversary can play this game betterthan Bob can, even for a fixed strategy byAlice!

I We need to prove that MinHash strategy isoptimal (for |A ∩ B| > 1)!

Page 114: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 4: Chosen ciphertext attack

I Given a valid ciphertext, Adversary can useBob as a pass/fail decryption oracle to do asensitivity analysis disclosing where he hascorrect keywords.

I Serious! Adversary may compute set ofcandidate words with small MinHash valuesin each such position. These are goodcandidates for being in B.

I Encrypt M with AEAD instead of AE, whereAD includes Y and nonces. Insecure? (ADand K are related.) Proof needed.

Page 115: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 4: Chosen ciphertext attack

I Given a valid ciphertext, Adversary can useBob as a pass/fail decryption oracle to do asensitivity analysis disclosing where he hascorrect keywords.

I Serious! Adversary may compute set ofcandidate words with small MinHash valuesin each such position. These are goodcandidates for being in B.

I Encrypt M with AEAD instead of AE, whereAD includes Y and nonces. Insecure? (ADand K are related.) Proof needed.

Page 116: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Attack 4: Chosen ciphertext attack

I Given a valid ciphertext, Adversary can useBob as a pass/fail decryption oracle to do asensitivity analysis disclosing where he hascorrect keywords.

I Serious! Adversary may compute set ofcandidate words with small MinHash valuesin each such position. These are goodcandidates for being in B.

I Encrypt M with AEAD instead of AE, whereAD includes Y and nonces. Insecure? (ADand K are related.) Proof needed.

Page 117: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Comparison with PinSketch

I Keyring scheme is not a “sketch”—Bob can’trecover A.

I Keyring scheme isn’t restricted to certainerror codes (e.g. algebraic codes).

I We don’t require bounded |U|.I PinSketch messages have size

|A⊕ B| log |U| .

I We send n = 256 bytes plus nonces.I Bob can decode whp if

p − k/n ≥ c√

np(1− p), which holds forconstant n if p > (1 + ε)k/n.

Page 118: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Comparison with PinSketch

I Keyring scheme is not a “sketch”—Bob can’trecover A.

I Keyring scheme isn’t restricted to certainerror codes (e.g. algebraic codes).

I We don’t require bounded |U|.I PinSketch messages have size

|A⊕ B| log |U| .

I We send n = 256 bytes plus nonces.I Bob can decode whp if

p − k/n ≥ c√

np(1− p), which holds forconstant n if p > (1 + ε)k/n.

Page 119: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Comparison with PinSketch

I Keyring scheme is not a “sketch”—Bob can’trecover A.

I Keyring scheme isn’t restricted to certainerror codes (e.g. algebraic codes).

I We don’t require bounded |U|.

I PinSketch messages have size

|A⊕ B| log |U| .

I We send n = 256 bytes plus nonces.I Bob can decode whp if

p − k/n ≥ c√

np(1− p), which holds forconstant n if p > (1 + ε)k/n.

Page 120: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Comparison with PinSketch

I Keyring scheme is not a “sketch”—Bob can’trecover A.

I Keyring scheme isn’t restricted to certainerror codes (e.g. algebraic codes).

I We don’t require bounded |U|.I PinSketch messages have size

|A⊕ B| log |U| .

I We send n = 256 bytes plus nonces.I Bob can decode whp if

p − k/n ≥ c√

np(1− p), which holds forconstant n if p > (1 + ε)k/n.

Page 121: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Comparison with PinSketch

I Keyring scheme is not a “sketch”—Bob can’trecover A.

I Keyring scheme isn’t restricted to certainerror codes (e.g. algebraic codes).

I We don’t require bounded |U|.I PinSketch messages have size

|A⊕ B| log |U| .

I We send n = 256 bytes plus nonces.

I Bob can decode whp ifp − k/n ≥ c

√np(1− p), which holds for

constant n if p > (1 + ε)k/n.

Page 122: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Comparison with PinSketch

I Keyring scheme is not a “sketch”—Bob can’trecover A.

I Keyring scheme isn’t restricted to certainerror codes (e.g. algebraic codes).

I We don’t require bounded |U|.I PinSketch messages have size

|A⊕ B| log |U| .

I We send n = 256 bytes plus nonces.I Bob can decode whp if

p − k/n ≥ c√

np(1− p), which holds forconstant n if p > (1 + ε)k/n.

Page 123: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Summary

I New scheme facilitates updates of keys;these updates can now be doneincrementally as well as all at once.

I New scheme has reduced message size.I Security is controllable via choices of n and

keyring size.I Keyword Matching Game of possible

independent interest.I Open problems include

I Determining optimal strategy in Keyword Matching Game.(Is it MinHash?)

I Analyzing security of AEAD variant against CCA.

Page 124: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Summary

I New scheme facilitates updates of keys;these updates can now be doneincrementally as well as all at once.

I New scheme has reduced message size.

I Security is controllable via choices of n andkeyring size.

I Keyword Matching Game of possibleindependent interest.

I Open problems include

I Determining optimal strategy in Keyword Matching Game.(Is it MinHash?)

I Analyzing security of AEAD variant against CCA.

Page 125: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Summary

I New scheme facilitates updates of keys;these updates can now be doneincrementally as well as all at once.

I New scheme has reduced message size.I Security is controllable via choices of n and

keyring size.

I Keyword Matching Game of possibleindependent interest.

I Open problems include

I Determining optimal strategy in Keyword Matching Game.(Is it MinHash?)

I Analyzing security of AEAD variant against CCA.

Page 126: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Summary

I New scheme facilitates updates of keys;these updates can now be doneincrementally as well as all at once.

I New scheme has reduced message size.I Security is controllable via choices of n and

keyring size.I Keyword Matching Game of possible

independent interest.

I Open problems include

I Determining optimal strategy in Keyword Matching Game.(Is it MinHash?)

I Analyzing security of AEAD variant against CCA.

Page 127: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Summary

I New scheme facilitates updates of keys;these updates can now be doneincrementally as well as all at once.

I New scheme has reduced message size.I Security is controllable via choices of n and

keyring size.I Keyword Matching Game of possible

independent interest.I Open problems include

I Determining optimal strategy in Keyword Matching Game.(Is it MinHash?)

I Analyzing security of AEAD variant against CCA.

Page 128: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Summary

I New scheme facilitates updates of keys;these updates can now be doneincrementally as well as all at once.

I New scheme has reduced message size.I Security is controllable via choices of n and

keyring size.I Keyword Matching Game of possible

independent interest.I Open problems include

I Determining optimal strategy in Keyword Matching Game.(Is it MinHash?)

I Analyzing security of AEAD variant against CCA.

Page 129: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Summary

I New scheme facilitates updates of keys;these updates can now be doneincrementally as well as all at once.

I New scheme has reduced message size.I Security is controllable via choices of n and

keyring size.I Keyword Matching Game of possible

independent interest.I Open problems include

I Determining optimal strategy in Keyword Matching Game.(Is it MinHash?)

I Analyzing security of AEAD variant against CCA.

Page 130: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

The End

Page 131: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Strategy for p = 1/max(|A|, |B|) when |A ∩ B| = 1,U = A ∪ B, |A| ≥ |B|

I Create bipartite graph whose vertices are all|A|-subsets (resp. all |B|-subsets) of U withan (X ,Y ) edge iff |X ∩ Y | = 1. The|A|-subsets have degree |A|; the |B|-subsetshave degree |B|.

I By Hall’s Thm you can find a matching thatcovers all |A|-subsets.

I Alice and Bob each choose keyword sharedwith their matched subset (if any).

I They pick the same keyword with probability1/|A| = 1/max(|A|, |B|). �

I (This only works for |A ∩ B| = 1. )

Page 132: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Strategy for p = 1/max(|A|, |B|) when |A ∩ B| = 1,U = A ∪ B, |A| ≥ |B|

I Create bipartite graph whose vertices are all|A|-subsets (resp. all |B|-subsets) of U withan (X ,Y ) edge iff |X ∩ Y | = 1. The|A|-subsets have degree |A|; the |B|-subsetshave degree |B|.

I By Hall’s Thm you can find a matching thatcovers all |A|-subsets.

I Alice and Bob each choose keyword sharedwith their matched subset (if any).

I They pick the same keyword with probability1/|A| = 1/max(|A|, |B|). �

I (This only works for |A ∩ B| = 1. )

Page 133: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Strategy for p = 1/max(|A|, |B|) when |A ∩ B| = 1,U = A ∪ B, |A| ≥ |B|

I Create bipartite graph whose vertices are all|A|-subsets (resp. all |B|-subsets) of U withan (X ,Y ) edge iff |X ∩ Y | = 1. The|A|-subsets have degree |A|; the |B|-subsetshave degree |B|.

I By Hall’s Thm you can find a matching thatcovers all |A|-subsets.

I Alice and Bob each choose keyword sharedwith their matched subset (if any).

I They pick the same keyword with probability1/|A| = 1/max(|A|, |B|). �

I (This only works for |A ∩ B| = 1. )

Page 134: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Strategy for p = 1/max(|A|, |B|) when |A ∩ B| = 1,U = A ∪ B, |A| ≥ |B|

I Create bipartite graph whose vertices are all|A|-subsets (resp. all |B|-subsets) of U withan (X ,Y ) edge iff |X ∩ Y | = 1. The|A|-subsets have degree |A|; the |B|-subsetshave degree |B|.

I By Hall’s Thm you can find a matching thatcovers all |A|-subsets.

I Alice and Bob each choose keyword sharedwith their matched subset (if any).

I They pick the same keyword with probability1/|A| = 1/max(|A|, |B|). �

I (This only works for |A ∩ B| = 1. )

Page 135: Symmetric Encryption via Keyrings and ECCarcticcrypt.b.uib.no/files/2016/07/Slides-Rivest.pdf · 2016-07-19 · Keyrings IEach word is a keyword. IBag is a keyring. ISeparate keyring

Strategy for p = 1/max(|A|, |B|) when |A ∩ B| = 1,U = A ∪ B, |A| ≥ |B|

I Create bipartite graph whose vertices are all|A|-subsets (resp. all |B|-subsets) of U withan (X ,Y ) edge iff |X ∩ Y | = 1. The|A|-subsets have degree |A|; the |B|-subsetshave degree |B|.

I By Hall’s Thm you can find a matching thatcovers all |A|-subsets.

I Alice and Bob each choose keyword sharedwith their matched subset (if any).

I They pick the same keyword with probability1/|A| = 1/max(|A|, |B|). �

I (This only works for |A ∩ B| = 1. )