8 research outputs found
A Fiat-Shamir Implementation Note
In the Micali-Shamir paper improving the efficiency of the original Fiat-Shamir protocol, the authors state that
(...) not all of the \u27s will be quadratic residues mod . We overcome this technical difficulty with an appropriate perturbation technique (...)
This perturbation technique is made more explicit in the associated patent application:
Each entity is allowed to modify the standard which are QNRs. A particularly simple way to achieve this is to pick a modulus where and , since then exactly one of is a QR mod for any . The appropriate variant of each can be (...) deduced by the verifier himself during the verification of given signatures.
In this short note we clarify the way in which the verifier can infer by himself the appropriate variant of each during verification
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
We introduce “thrifty” zero-knowledge protocols, or TZK.
These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of this approach on several well-known zero-knowledge protocols
Public-Key Based Lightweight Swarm Authentication
We describe a lightweight algorithm performing whole-network authentication in a distributed way. This protocol is more efficient than one-to-one node authentication: it results in less communication, less computation, and overall lower energy consumption.
The proposed algorithm is provably secure, and achieves zero-knowledge authentication of a network in a time logarithmic in the number of nodes
Breaking Symmetric Cryptosystems Using Quantum Period Finding
Due to Shor's algorithm, quantum computers are a severe threat for public key
cryptography. This motivated the cryptographic community to search for
quantum-safe solutions. On the other hand, the impact of quantum computing on
secret key cryptography is much less understood. In this paper, we consider
attacks where an adversary can query an oracle implementing a cryptographic
primitive in a quantum superposition of different states. This model gives a
lot of power to the adversary, but recent results show that it is nonetheless
possible to build secure cryptosystems in it.
We study applications of a quantum procedure called Simon's algorithm (the
simplest quantum period finding algorithm) in order to attack symmetric
cryptosystems in this model. Following previous works in this direction, we
show that several classical attacks based on finding collisions can be
dramatically sped up using Simon's algorithm: finding a collision requires
queries in the classical setting, but when collisions happen
with some hidden periodicity, they can be found with only queries in the
quantum model.
We obtain attacks with very strong implications. First, we show that the most
widely used modes of operation for authentication and authenticated encryption
e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security
model. Our attacks are also applicable to many CAESAR candidates: CLOC, AEZ,
COPA, OTR, POET, OMD, and Minalpher. This is quite surprising compared to the
situation with encryption modes: Anand et al. show that standard modes are
secure with a quantum-secure PRF.
Second, we show that Simon's algorithm can also be applied to slide attacks,
leading to an exponential speed-up of a classical symmetric cryptanalysis
technique in the quantum model.Comment: 31 pages, 14 figure
