On Provable Security of Cryptographic Schemes

Volume: 2 Number: 2 June 28, 2013
EN

On Provable Security of Cryptographic Schemes

Abstract

Provable security is an important issue in modern cryptography because it satisfies the security of the encryption schemes in a theoretical way via a reduction method. Typically, a mathematically hard problem M is reduced to breaking the scheme S that is wanted to be proven secure. Existence of such a reduction implies that the problem of breaking the scheme S is as hard as M. This reduction results in a contradiction by arguing that if there exists a polynomial time algorithm A breaking S, then one consructs a polynomial time algorithm B to solve M by using A as a subroutine. Besides, to prove the security of a cryptographic scheme, it is necessarry to define the goals and the capabilities of the adversary. In this paper, we review security models in terms of the adversarial goals and the adversarial capabilities. We define what security actually means to decide whether a scheme is secure. We review the definition of provably security by means of several games between the challenger and the adversary in some security models, namely the standard model and the random oracle model. We state the main differences between these two models and observe the advantage of the success probability of the adversary in breaking the cryptographic schemes. We investigate the security of some public key encryption schemes such as RSA, ElGamal, Cramer-Shoup and discuss under which circumstances they satisfy which security notions.

Keywords

References

  1. M. Bellare, P. Rogaway, Random oracles are practical: A Paradigm for designing efficient protocols. Proc. of the First ACM Conference on Computer and Communications Security, pp. 62-73, 1993.
  2. M. Bellare, P. Rogaway, Optimal Asymmetric Encryption How to encrypt with RSA. Extended abstract in Advances in Cryptology - Proc., LNCS, vol. 950, EUROCRYPT’94.
  3. R. Canetti, O. Goldreich, S. Halevi, The random oracle methodology, revisited, Proc. of the 30th ACM Symp. on Theory of Computing (STOC), pp. 209-218, 1998.
  4. R. Cramer, Victor Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Proc. of the 18th Annual International Cryptology Conference on Advances in Cryptology, pp. 13-25, CRYPTO ’98.
  5. I. Damgard, Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks, In Advances in CryptologyCRYPTO’91.
  6. Y. Desmedt, D. Phan, A CCA secure Hybrid Damgard’s ElGamal Encryption, Lecture Notes in Computer Science, vol. 5324, pp. 68-82, 2008.
  7. W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, vol. IT-22, pp. 644– 654, 1976.
  8. D. Dolev, C. Dwork, M. Naor, Non-Malleable Cryptography, STOC’91.

Details

Primary Language

English

Subjects

-

Journal Section

-

Publication Date

June 28, 2013

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2013 Volume: 2 Number: 2

APA
Hanoymak, T. (2013). On Provable Security of Cryptographic Schemes. International Journal of Information Security Science, 2(2), 44-56. https://izlik.org/JA48TH52UD
AMA
1.Hanoymak T. On Provable Security of Cryptographic Schemes. IJISS. 2013;2(2):44-56. https://izlik.org/JA48TH52UD
Chicago
Hanoymak, Turgut. 2013. “On Provable Security of Cryptographic Schemes”. International Journal of Information Security Science 2 (2): 44-56. https://izlik.org/JA48TH52UD.
EndNote
Hanoymak T (June 1, 2013) On Provable Security of Cryptographic Schemes. International Journal of Information Security Science 2 2 44–56.
IEEE
[1]T. Hanoymak, “On Provable Security of Cryptographic Schemes”, IJISS, vol. 2, no. 2, pp. 44–56, June 2013, [Online]. Available: https://izlik.org/JA48TH52UD
ISNAD
Hanoymak, Turgut. “On Provable Security of Cryptographic Schemes”. International Journal of Information Security Science 2/2 (June 1, 2013): 44-56. https://izlik.org/JA48TH52UD.
JAMA
1.Hanoymak T. On Provable Security of Cryptographic Schemes. IJISS. 2013;2:44–56.
MLA
Hanoymak, Turgut. “On Provable Security of Cryptographic Schemes”. International Journal of Information Security Science, vol. 2, no. 2, June 2013, pp. 44-56, https://izlik.org/JA48TH52UD.
Vancouver
1.Turgut Hanoymak. On Provable Security of Cryptographic Schemes. IJISS [Internet]. 2013 Jun. 1;2(2):44-56. Available from: https://izlik.org/JA48TH52UD