New Notions of Secrecy and User Generated Randomness in Cryptography
Total Page:16
File Type:pdf, Size:1020Kb
University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies The Vault: Electronic Theses and Dissertations 2014-09-30 New Notions of Secrecy and User Generated Randomness in Cryptography Alimomeni, Mohsen Alimomeni, M. (2014). New Notions of Secrecy and User Generated Randomness in Cryptography (Unpublished doctoral thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/27097 http://hdl.handle.net/11023/1874 doctoral thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca UNIVERSITY OF CALGARY New Notions of Secrecy and User Generated Randomness in Cryptography by Mohsen Alimomeni A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF COMPUTER SCIENCE CALGARY, ALBERTA SEPTEMBER, 2014 c Mohsen Alimomeni 2014 Abstract Randomness plays a central role in computer science, in particular cryptography. Almost all cryptographic primitives depend crucially on randomness because randomness and unpre- dictability in secret keys provides the means for security. Usually one assumes that perfect randomness, a sequence of independently and uniformly distributed bits, are accessible to algorithms. This is a strong assumption. Physical sources of randomness are neither uniformly random, nor produce necessarily independent bits. Therefore, the aim of this thesis is to start from a realistic model of randomness, investigate notions of secrecy and their randomness requirements and finally find practical methods for generation of randomness that matches the requirements of cryptographic primitives. We consider a model of random source where the source output follows one distribution from a set of possible distributions, each with the property that the maximum probability of symbols is bounded and can not be arbitrarily close to 1. This model does not assume independence or uniformity of the output symbols, and is considered to be a realistic model of randomness. From this point, the thesis can be divided into two main parts: In the first part, considering various notions of information theoretic secrecy, a fundamental problem is to find the properties of randomness needed to achieve security in these notions. Traditional cryptographic protocols simply assume perfect randomness and build on this assumption. We explore the results that show secrecy can not be based on imperfect random- ness that is not uniform or independent. Thus a line of work attempts to relax notions of secrecy in such a way that they can be constructed with non-perfect sources, and possibly require smaller key sizes. Yet they should match real life applications. An important work in this context is entropic security where the key size could be smaller than the message depending on message distribution. Inspired by this, we propose two relaxed notions of secrecy that are motivated by practical applications. In the first notion, motivated by an i application in biometrics authentication, we propose guessing secrecy where the probability of guessing the message for a computational unbounded adversary with the best strategy remains the same when a ciphertext is given or when it is not. We compare the randomness requirements of guessing secrecy with stronger notions and show that in some cases such as key length, the requirements are the same. For key distribution however, we found a family of distributions that provide guessing secrecy but not perfect secrecy. In the second notion, we investigate randomness requirements of multiple message encryption. Considering a natural extension of secrecy definition to multiple messages, we show that independent keys are needed to encrypt each message. We then propose a relaxed notion in which the security of last message is more important than past messages, although the leakage of past messages is bounded using entropic security. By this assumption, we achieve smaller key length compared to -indistinguishability, and comparable to key length for entropic security. This notion has applications such as location privacy. In the second part of the thesis, since secrecy crucially depends on perfect randomness, we investigate how perfect randomness can be practically generated, specifically from human game-play. Unlike many random number generators that assume independent or uniform random bits in the random source, we base our work on the realistic model of randomness. Our main observation is that human game-play has an element of randomness coming from the errors in their game-play which is the main entertaining factor of the game. We also observed that this game-play can distinguish among a group of people if the right features are collected from the game-play. We incrementally changed our game design until the distinguishability among a small population is maximized, and then run the experiments required to show the viability of this approach over a larger population. This approach can also provide a hard to delegate authentication property where a human could not emulate the behavior of another human even given statistical information about their game-play. Acknowledgments My research and this thesis would not have been possible without the help and support of kind people around me; my supervisor, committee members, friends, family and my wife. First and foremost I wish to express my deepest appreciation to my supervisor, Reihaneh Safavi-Naini, for her continuous support during my PhD study and research. Your patience in reading the drafts of my work over and over helped me learn a lot from your comments and views on topics discussed in this thesis. The joy and enthusiasm you have for research was contagious and motivational for me. My sincere thanks goes to my supervisor committee, Philipp Woelfel and Payman Mohassel who helped me during different stages of my research in UofC. I would like to thank my examiners Keith Martin and Christoph Simon for the comments and suggestions that improved this work. I gratefully acknowledge the funding sources that made my Ph.D. work possible. The funding was provided as scholarship, teaching and research assistantships I received from department of computer science in UofC and Alberta Innovates Technology Future (AITF) . I would like to thank many friends that made our life happier during our stay in Calgary. Specifically I appreciate Johnson family for their kind hospitality. I enjoyed my time in Calgary with my close friends and their family for the gatherings and trips we had together. Thank you all my nice friends. I would also like to thank my parents, brothers and sister. They were always supporting me and encouraging me with their best wishes. Nobody could have stood by me through the good and bad times of more than 4 years of my study better than my wife. In occasions when I was very busy with paper deadlines, she tolerated a monotonous life, yet cheered me up to motivate me work better. I am indebted to you Narges Mashayekhi. iii Table of Contents Abstract .........................................i Acknowledgments ................................... iii Table of Contents . iv List of Tables . viii List of Figures . ix List of Symbols . .x 1 Introduction . .1 1.1 Formal model of randomness . .2 1.2 Randomness for secrecy . .3 1.2.1 Guessing secrecy . .6 1.2.2 Correlated keys for multiple messages . .7 1.3 Generating random numbers, and applications . .8 1.3.1 TRG from human game-play: Using video games . .9 1.3.2 TRG from human game-play: Game theoretic approach . .9 1.3.3 User generated randomness for authentication . .9 1.4 Other contributions . 10 1.4.1 Review, partial results, and comparison of secrecy primitives . 10 1.4.2 Location based storage . 10 1.5 Subsequent works . 11 1.6 Thesis structure . 11 1.6.1 Theorems and proofs . 12 2 Preliminaries and Basics . 13 2.1 Probability theory . 13 2.2 Information theoretic measures . 14 2.3 Information theoretic security . 20 2.3.1 Computational versus information theoretic model . 21 2.4 Secrecy . 22 2.4.1 Secret sharing . 26 2.5 Concluding remarks . 28 3 Randomness requirement of secrecy . 29 3.1 Modeling random sources . 29 3.2 Dealing with weak random sources in cryptography . 32 3.2.1 Local versus public versus shared randomness . 34 3.3 Paradigm 1: Randomness extraction . 34 3.3.1 Deterministic extractors . 35 3.3.2 Seeded Extractors . 36 3.4 Paradigm 2: Constructions using imperfect randomness . 38 3.4.1 Randomness requirements for perfect secrecy . 39 3.4.2 Relaxation of perfect secrecy . 41 3.4.3 Comparison of perfect secrecy relaxations . 42 3.4.4 Randomness requirements of indistinguishability . 43 3.4.5 Secrecy with weak random sources . 45 iv 3.4.6 t-source admit randomized encryption . 48 3.4.7 One-time pad is universal for deterministic encryption . 49 3.5 Randomness requirement for secret sharing . 52 3.6 Authentication sources . 58 3.6.1 Authentication with t-sources . 60 3.7 Comparison of random sources . 61 3.8 Concluding remarks . 62 4 Guessing secrecy . 64 4.1 Introduction . 64 4.1.1 Motivation . 65 4.1.2 Related work . 66 4.1.3 Our contribution . 67 4.2 Secrecy based on guessing probability . 68 4.3 Requirements on the key size . 70 4.4 Requirements on the key distribution . 75 4.4.1 Guessing secrecy with imperfect randomness . 78 4.4.2 Relation with perfect secrecy . 80 4.5 Applications . 81 4.6 Bounds on conditional min-entropy . 82 4.7 Concluding remarks . 85 5 Information Theoretic Security of Sequential High Entropy Messages . 86 5.1 Introduction . 86 5.1.1 Our contribution .