首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Non-uniform Cracks in the Concrete: The Power of Free Precomputation
【24h】

Non-uniform Cracks in the Concrete: The Power of Free Precomputation

机译:混凝土中的非均匀裂缝:自由预注入的力量

获取原文

摘要

AES-128, the NIST P-256 elliptic curve, DSA-3072, RSA-3072, and various higher-level protocols are frequently conjectured to provide a security level of 2~(128). Extensive cryptanalysis of these primitives appears to have stabilized sufficiently to support such conjectures. In the literature on provable concrete security it is standard to define 2~b security as the nonexistence of high-probability attack algorithms taking time ≤2~b. However, this paper provides overwhelming evidence for the existence of high-probability attack algorithms against AES-128, NIST P-256, DSA-3072, and RSA-3072 taking time considerably below 2~(128), contradicting the standard security conjectures. These attack algorithms are not realistic; do not indicate any actual security problem; do not indicate any risk to cryptographic users; and do not indicate any failure in previous cryptanalysis. Any actual use of these attack algorithms would be much more expensive than the conventional 2~(128) attack algorithms. However, this expense is not visible to the standard definitions of security. Consequently the standard definitions of security fail to accurately model actual security. The underlying problem is that the standard set of algorithms, namely the set of algorithms taking time ≤2~b, fails to accurately model the set of algorithms that an attacker can carry out. This paper analyzes this failure in detail, and analyzes several ideas for fixing the security definitions.
机译:AES-128,NIST P-256椭圆曲线,DSA-3072,RSA-3072和各种更高级别的协议经常猜测,以提供2〜(128)的安全水平。这些基元的广泛密码分析似乎足够稳定以支持这种猜想。在可证明的具体安全性上的文献中,它标准定义2〜B安全性,因为需要时间≤2〜b的高概率攻击算法的不存在性。然而,本文提供了针对AES-128,NIST P-256,DSA-3072和RSA-3072的高概率攻击算法存在的压倒性证据,其花费大于2〜(128),与标准安全猜测相矛盾。这些攻击算法不现实;不要表示任何实际的安全问题;不要指示加密用户的任何风险;并且不显示先前密码分析的任何故障。这些攻击算法的任何实际使用比传统的2〜(128)攻击算法更昂贵。但是,对安全的标准定义不可见这种费用。因此,安全的标准定义无法准确地模拟实际安全性。潜在的问题是标准的算法集,即花费时间≤2〜B的算法集,不能准确地模拟攻击者可以执行的一组算法。本文详细分析了此故障,并分析了用于修复安全定义的几个想法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号