Resources in Cryptography

87
Resources in Cryptography Ed Blakey [email protected] http://users.ox.ac.uk/~quee1871/ Information Security as a Resource 13.x.2011 Oxford University Computer Science Department

Transcript of Resources in Cryptography

Page 1: Resources in Cryptography

Resources in Cryptography

Ed Blakey

[email protected]

http://users.ox.ac.uk/~quee1871/

Information Security as a Resource

13.x.2011

Oxford University Computer Science Department

Page 2: Resources in Cryptography

Disclaimer!

Page 3: Resources in Cryptography

Computational complexity.

Complexity: how resources scale with respect to |x|. Says something: (directly) about efficiency of M, and

(indirectly) about difficulty of computing f.

output input

M

Page 4: Resources in Cryptography

Computational complexity.

Complexity: how resources scale with respect to |x|. Says something: (directly) about efficiency of M, and

(indirectly) about difficulty of computing f.

output input

x f(x)

f

M

Page 5: Resources in Cryptography

Computational complexity.

Complexity: how resources scale with respect to |x|. Says something: (directly) about efficiency of M, and

(indirectly) about difficulty of computing f.

output input

x f(x)

f

M

Page 6: Resources in Cryptography

Computational complexity.

Complexity: how resources scale with respect to |x|. Says something: (directly) about efficiency of M, and

(indirectly) about difficulty of computing f.

output input

x f(x)

f

M

Page 7: Resources in Cryptography

Computational complexity.

Complexity: how resources scale with respect to |x|. Says something: (directly) about efficiency of M, and

(indirectly) about difficulty of computing f.

Resources

output input

x f(x)

f

M

Page 8: Resources in Cryptography

Computational complexity.

Complexity: how resources scale with respect to |x|. Says something: (directly) about efficiency of M, and

(indirectly) about difficulty of computing f.

Resources

output input

x f(x)

f

M

Page 9: Resources in Cryptography

Computational complexity.

Complexity: how resources scale with respect to |x|. Says something: (directly) about efficiency of M, and

(indirectly) about difficulty of computing f.

Resources

output input

x f(x)

f

M

Page 10: Resources in Cryptography

Standard resources.

Bounds in terms of time and space.

Page 11: Resources in Cryptography

Standard resources.

Bounds in terms of time and space.

NP P

EXP AC0

PH

coNP

BPP

PSPACE

NC

P/poly

L

PP

BQP

Page 12: Resources in Cryptography

Standard resources.

Bounds in terms of time and space.

NP P

EXP AC0

PH

coNP

BPP

PSPACE

NC

P/poly

L

PP

BQP

non-determinism

Page 13: Resources in Cryptography

Standard resources.

Bounds in terms of time and space.

NP P

EXP AC0

PH

coNP

BPP

PSPACE

NC

P/poly

L

PP

BQP

non-determinism

parallelism

Page 14: Resources in Cryptography

Standard resources.

Bounds in terms of time and space.

NP P

EXP AC0

PH

coNP

BPP

PSPACE

NC

P/poly

L

PP

BQP

non-determinism

parallelism

Page 15: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 16: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 17: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 18: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 19: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 20: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 21: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 22: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Photo credit: Department of Energy/Coherent Inc Laser Group

Page 23: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 24: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 25: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 26: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 27: Resources in Cryptography

Non-standard resources

e.g., precision.

Precision complexity.

Detail deferred: A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

Page 28: Resources in Cryptography

Resources…

…for computation.

…for cryptographic protocols.

time space

Page 29: Resources in Cryptography

Resources…

…for computation.

…for cryptographic protocols.

time space

precision

Page 30: Resources in Cryptography

Resources…

…for computation.

…for cryptographic protocols.

time space

precision material cost

thermodynamic cost

energy

mass

Page 31: Resources in Cryptography

Resources…

…for computation.

…for cryptographic protocols.

time space

precision material cost

thermodynamic cost

energy

mass etc.

Page 32: Resources in Cryptography

Resources…

…for computation.

…for cryptographic protocols.

time space

precision material cost

thermodynamic cost

energy

mass etc.

Page 33: Resources in Cryptography

Resources…

…for computation.

…for cryptographic protocols.

time space

precision material cost

thermodynamic cost

energy

mass etc.

Page 34: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Page 35: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Page 36: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Page 37: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob…

Page 38: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob…

Page 39: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob…

Page 40: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Page 41: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob…

Page 42: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob…

Page 43: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob…

Earday Obbay…

Page 44: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob…

Earday Obbay…

Page 45: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob… Dear Bob…

Earday Obbay…

Page 46: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob… Dear Bob…

Earday Obbay…

Key

Page 47: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Dear Bob… Dear Bob…

Earday Obbay…

Key

Page 48: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Decrypt

Dear Bob… Dear Bob…

Earday Obbay…

Key

Page 49: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Decrypt

Dear Bob… Dear Bob…

Earday Obbay…

Key

Page 50: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Page 51: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Key gen

Page 52: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Key gen

Public Private

Page 53: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Key gen

Public Private

Page 54: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Key gen

Dear Bob…

Public Private

Page 55: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 56: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 57: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 58: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 59: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 60: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 61: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 62: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 63: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 64: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 65: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 66: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 67: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

Page 68: Resources in Cryptography

Communication.

Symmetric-key cryptography.

Public-key cryptography.

Computation. Communication. Information — inc. side-channel info.

?

Key gen

Earday Obbay…

Dear Bob…

Public Private

What we want to capture

Page 69: Resources in Cryptography

Resource of ‘security’.

Temptation: to produce some (1-D) quantity (that depends on |key|, say) that’s

� large when things are difficult for Eve but easy for Alice and Bob, and

� small otherwise. However, boils down to standard comp. complexity of Eve’s decryption computation. Instead, maybe want a (multi-D) quantity that reflects

� computational difficulty for Eve,

� computational ease for Alice and Bob,

� information aspects of protocol,

� etc.

Page 70: Resources in Cryptography

Resource of ‘security’.

Temptation: to produce some (1-D) quantity (that depends on |key|, say) that’s

� large when things are difficult for Eve but easy for Alice and Bob, and

� small otherwise. However, boils down to standard comp. complexity of Eve’s decryption computation. Instead, maybe want a (multi-D) quantity that reflects

� computational difficulty for Eve,

� computational ease for Alice and Bob,

� information aspects of protocol,

� etc.

Page 71: Resources in Cryptography

Resource of ‘security’.

Temptation: to produce some (1-D) quantity (that depends on |key|, say) that’s

� large when things are difficult for Eve but easy for Alice and Bob, and

� small otherwise. However, boils down to standard comp. complexity of Eve’s decryption computation. Instead, maybe want a (multi-D) quantity that reflects

� computational difficulty for Eve,

� computational ease for Alice and Bob,

� information aspects of protocol,

� etc.

e.g. factorization

Page 72: Resources in Cryptography

Resource of ‘security’.

Temptation: to produce some (1-D) quantity (that depends on |key|, say) that’s

� large when things are difficult for Eve but easy for Alice and Bob, and

� small otherwise. However, boils down to standard comp. complexity of Eve’s decryption computation. Instead, maybe want a (multi-D) quantity that reflects

� computational difficulty for Eve,

� computational ease for Alice and Bob,

� information aspects of protocol,

� etc.

e.g. factorization

Page 73: Resources in Cryptography

Resource of ‘security’.

Temptation: to produce some (1-D) quantity (that depends on |key|, say) that’s

� large when things are difficult for Eve but easy for Alice and Bob, and

� small otherwise. However, boils down to standard comp. complexity of Eve’s decryption computation. Instead, maybe want a (multi-D) quantity that reflects

� computational difficulty for Eve,

� computational ease for Alice and Bob,

� information aspects of protocol,

� etc.

e.g. factorization

i.e. ‘what we want to capture’ (prev. slide)

Page 74: Resources in Cryptography

Maintaining generality.

Problem with using concepts like ‘difficulty for Eve’:

— assumes rigid goody/baddy roles seen in cryptographic protocols,

but not necessarily seen in wider information-theory setting. Instead, consider how hard agents must compute, what they know, etc. without using a priori goody/baddy labels. Then work out which agent is Alice, which is Bob, which is Eve based on difficulty, etc.

Page 75: Resources in Cryptography

Maintaining generality.

Problem with using concepts like ‘difficulty for Eve’:

— assumes rigid goody/baddy roles seen in cryptographic protocols,

but not necessarily seen in wider information-theory setting. Instead, consider how hard agents must compute, what they know, etc. without using a priori goody/baddy labels. Then work out which agent is Alice, which is Bob, which is Eve based on difficulty, etc.

(complexity) (information)

Page 76: Resources in Cryptography

Maintaining generality.

Problem with using concepts like ‘difficulty for Eve’:

— assumes rigid goody/baddy roles seen in cryptographic protocols,

but not necessarily seen in wider information-theory setting. Instead, consider how hard agents must compute, what they know, etc. without using a priori goody/baddy labels. Then work out which agent is Alice, which is Bob, which is Eve based on difficulty, etc.

(complexity) (information)

Page 77: Resources in Cryptography

Primitives.

One-way fn. Trapdoor fn. Pseudorandom no. gen. etc.

Goody/baddy-free approach ⇒ dealing at level of primitives rather than

dealing with full-blown protocols with predefined roles. So, want to consider trade-offs between security and not only resources, but also primitives.

Page 78: Resources in Cryptography

Primitives.

One-way fn. Trapdoor fn. Pseudorandom no. gen. etc.

Goody/baddy-free approach ⇒ dealing at level of primitives rather than

dealing with full-blown protocols with predefined roles. So, want to consider trade-offs between security and not only resources, but also primitives.

Page 79: Resources in Cryptography

Primitives.

One-way fn. Trapdoor fn. Pseudorandom no. gen. etc.

Goody/baddy-free approach ⇒ dealing at level of primitives rather than

dealing with full-blown protocols with predefined roles. So, want to consider trade-offs between security and not only resources, but also primitives.

Page 80: Resources in Cryptography

Primitives.

One-way fn. Trapdoor fn. Pseudorandom no. gen. etc.

Goody/baddy-free approach ⇒ dealing at level of primitives rather than

dealing with full-blown protocols with predefined roles. So, want to consider trade-offs between security and not only resources, but also primitives.

Page 81: Resources in Cryptography

Idea.

Want a framework that accommodates such things as

� computational resources (⇒ complexity),

� communication resources,

� primitives and

� availability of information.

Gives us a better chance of spotting (e.g.) side-channel attacks than (say) a complexity-only view.

Can view a process (computation, comm., etc.) as having costs in these ‘dimensions’. Many such processes/entities have ‘thickness’ in only one dimension;

if this were true of all entities, then framework would decompose and give nothing new. But some special entities—like security—straddle more than one dimension,

and make the structure non-trivial and useful.

Page 82: Resources in Cryptography

Idea.

Want a framework that accommodates such things as

� computational resources (⇒ complexity),

� communication resources,

� primitives and

� availability of information.

Gives us a better chance of spotting (e.g.) side-channel attacks than (say) a complexity-only view.

Can view a process (computation, comm., etc.) as having costs in these ‘dimensions’. Many such processes/entities have ‘thickness’ in only one dimension;

if this were true of all entities, then framework would decompose and give nothing new. But some special entities—like security—straddle more than one dimension,

and make the structure non-trivial and useful.

Page 83: Resources in Cryptography

Idea.

Want a framework that accommodates such things as

� computational resources (⇒ complexity),

� communication resources,

� primitives and

� availability of information.

Gives us a better chance of spotting (e.g.) side-channel attacks than (say) a complexity-only view.

Can view a process (computation, comm., etc.) as having costs in these ‘dimensions’. Many such processes/entities have ‘thickness’ in only one dimension;

if this were true of all entities, then framework would decompose and give nothing new. But some special entities—like security—straddle more than one dimension,

and make the structure non-trivial and useful.

Page 84: Resources in Cryptography

Idea.

Want a framework that accommodates such things as

� computational resources (⇒ complexity),

� communication resources,

� primitives and

� availability of information.

Gives us a better chance of spotting (e.g.) side-channel attacks than (say) a complexity-only view.

Can view a process (computation, comm., etc.) as having costs in these ‘dimensions’. Many such processes/entities have ‘thickness’ in only one dimension;

if this were true of all entities, then framework would decompose and give nothing new. But some special entities—like security—straddle more than one dimension,

and make the structure non-trivial and useful.

Page 85: Resources in Cryptography

Idea.

Want a framework that accommodates such things as

� computational resources (⇒ complexity),

� communication resources,

� primitives and

� availability of information.

Gives us a better chance of spotting (e.g.) side-channel attacks than (say) a complexity-only view.

Can view a process (computation, comm., etc.) as having costs in these ‘dimensions’. Many such processes/entities have ‘thickness’ in only one dimension;

if this were true of all entities, then framework would decompose and give nothing new. But some special entities—like security—straddle more than one dimension,

and make the structure non-trivial and useful.

Page 86: Resources in Cryptography

Questions?

Discussion.

Precision complexity reference:

A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

This research was funded by the EPSRC grant:

Complexity and Decidability in Unconventional Computational Models (EP/G003017/1) Ed Blakey http://users.ox.ac.uk/~quee1871/

[email protected]

Page 87: Resources in Cryptography

Questions?

Discussion.

Precision complexity reference:

A Model-Independent Theory of Computational Complexity http://users.ox.ac.uk/~quee1871/thesis.pdf

This research was funded by the EPSRC grant:

Complexity and Decidability in Unconventional Computational Models (EP/G003017/1) Ed Blakey http://users.ox.ac.uk/~quee1871/

[email protected]