[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Minimizing the use of random oracles in authenticated encryption schemes

  • Session 1: Theoretical Foundations of Security
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

A cryptographic scheme is “provably secure” if an attack on the scheme implies an attack on the underlying primitives it employs. A cryptographic scheme is “provably secure in the random-oracle model” if it uses a cryptographic hash function F and is provably secure when F is modeled by a public random function. Demonstrating that a crypto graphic scheme is provably secure in the random-oracle model engenders much assurance in the scheme's correctness. But there may remain some lingering fear that the concrete hash function which instantiates the random oracle differs from a random function in some significant way. So it is good to limit reliance on random oracles. Here we describe two encryption schemes which use their random oracles in a rather limited way. The schemes achieve semantic security and plaintext awareness under specified assumptions. One scheme uses the RSA primitive; another uses Diffie-Hellman. In either case messages longer than the modulus length can be safely and directly encrypted without relying on the hash functions modeled as random-oracles to be good for private-key encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare, R. Canetti and H. Krawczyk, “Keying hash functions for message authentication,” Advances in Cryptology — Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996.

    Google Scholar 

  2. M. Bellare and P. Rogaway, “Minimizing the use of random oracles in authenticated encryption schemes.” More complete version of this paper, http://wwwcsif.cs.ucdavis.edu/-rogaway.

    Google Scholar 

  3. M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols,” Proceedings of the First Annual Conference on Computer and Communications Security, ACM, 1993.

    Google Scholar 

  4. M. Bellare and P. Rogaway, “Optimal asymmetric encryption-How to encrypt with RSA”. Current version available at URL of either author. Earlier version in Advances in Cryptology — Eurocrypt 94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed., Springer-Verlag, 1994.

    Google Scholar 

  5. M. Bellare and P. Rogaway, “The exact security of digital signatures-How to sign with RSA and Rabin.” Current version available at URL of either author. Earlier version in Advances in Cryptology — Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.

    Google Scholar 

  6. M. Blum and S. Goldwasser, “An efficient probabilistic public-key encryption scheme which hides all partial information,” Advances in Cryptology — Crypto 84 Proceedings, Lecture Notes in Computer Science Vol. 196, R. Blakely ed., Springer-Verlag, 1984.

    Google Scholar 

  7. I. Damgård, “Towards practical public key cryptosystems secure against chosen ciphertext attacks,” Advances in Cryptology — Crypto 91 Proceedings, Lecture Notes in Computer Science Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991.

    Google Scholar 

  8. D. Dolev, C. Dwork and M. Naor, “Non-malleable cryptography,” Proceedings of the 23rd Annual Symposium on Theory of Computing, ACM, 1991.

    Google Scholar 

  9. C. ELLISON, personal communication, September 1996.

    Google Scholar 

  10. S. Goldwasser and S. Micali, “Probabilistic Encryption,” Journal of Computer and System Sciences28, 270–299, April 1984.

    Article  Google Scholar 

  11. IEEE P1363 COMMITTEE, IEEE P1363 Working Draft, February 6, 1997. Lisa Yiquin, editor. Current draft in http://stdsbbs.ieee.org/groups/1363/index.html.

    Google Scholar 

  12. D. Johnson and S. Matyas. “Asymmetric encryption: evolution and enhancements,” CryptoBytes, Vol. 2, No. 1, Spring 1996.

    Google Scholar 

  13. D. Johnson, A. Lee, W. Martin, S. MATYAS and J. Wilkins, “Hybrid key distribution scheme giving key record recovery,” IBM Technical Disclosure Bulletin, 37(2A), 5–16, February 1994.

    Google Scholar 

  14. D. Johnson, S. Matyas, M. Peyravian, “Encryption of long blocks using a short-block encryption procedure.” November 1996. Available in http://stdsbbs.ieee.org/groups/1363/index.html.

    Google Scholar 

  15. IEEE P1363 COMMITTEE, Burt Kaliski, chair. Unpublished e-mail memorandum with subject heading: “Technical Subcommittee on Encryption Schemes.” September 10, 1996.

    Google Scholar 

  16. M. Luby and C. Rackoff, “How to construct pseudorandom permutations from pseudorandom functions.” SIAM J. Computation, Vol. 17, No. 2, April 1988.

    Google Scholar 

  17. S. Matyas, M. Peyravian, A. Roginsky, “Security analysis of Feistel ladder formatting procedure.” March 1997. Available in http://stdsbbs.ieee.org/groups/1363/index.html.

    Google Scholar 

  18. M. Naor and M. Yung, “Public-key cryptosystems provably secure against chosen ciphertext attacks,” Proceedings of the 22nd Annual Symposium on Theory of Computing, ACM, 1990.

    Google Scholar 

  19. D. Pointcheval and J. Stern, “Security proofs for signatures,” Advances in Cryptology — Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.

    Google Scholar 

  20. R. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” CALM 21 (1978).

    Google Scholar 

  21. RSA Data Security, Inc., “PKCS #1: RSA Encryption Standard,” June 1991.

    Google Scholar 

  22. Y. Zheng, “Public key authenticated encryption schemes using universal hashing,” (15 Oct 96). Unpublished contribution to P1363. ftp://stdsbbs.ieee.org/pub/p1363/contributions/aes-uhf.ps

    Google Scholar 

  23. Y. Zheng and J. Seberry, “Immunizing public key cryptosystems against chosen ciphertext attack.” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, 715–724 (1993).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Bellare, M., Rogaway, P. (1997). Minimizing the use of random oracles in authenticated encryption schemes. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028457

Download citation

  • DOI: https://doi.org/10.1007/BFb0028457

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics