On the Cryptanalysis via Approximation of Cryptographic Primitives Relying on the Planted Clique Conjecture

نویسندگان

  • Aubrey Alston
  • Yanrong Wo
چکیده

The core constructive task of the field of cryptography is that of creating cryptographic primitives (e.g. private-key encryption, public-key encryption, message authentication codes,...) with provable security guarantees. Where perfect (information theoretic) security is impossible, cryptographers must in practice necessarily rely on the assumption that some problem is hard to solve in nearly every case (a computational hardness assumption). Primitives in these cases generally provide guarantees of the following informal form: assuming that an enemy takes a long time to solve some problem Y , a system using X is secure. In general, the computational hardness assumptions used in the wild are derived from problems for which many have tried and failed to provide polynomial-time solutions; some of the most common examples include integer factorization, quadratic residuosity, the discrete log problem, and on. At best, our reliance on these problems nests security in the hope that these specific, at times disparate problems will continue to elude researchers: by and large, none of these assumptions are supported by a well-founded general description of hardness as we would see in e.g. complexity theory. As such, one of the so-called ‘holy grails’ of cryptography is to instead vest the hopes for security in a single well-founded, well-known, and well-studied assumption, such as the assumption that P ≠NP . While the reliable use of some NP-complete problem in tandem with the assumption that P ≠ NP has eluded cryptographers due to lack of results showing average-case hardness, one alternative which has been explored is reliance on assumptions that solving certain NP-hard optimization problems within some degree of accuracy is computationally difficult in specific instance classes. In this work, we explore one such example of this effort, [10], which attempts to construct cryptographic primitives by relying on the planted clique conjecture. More specifically, we (1) present [10] in summary, (2) propose a simple cryptanalytic method for the one-way function primitive suggested in [10] using approximation algorithms, and (3) consider the feasibility of such cryptanalysis in the context of existing approximation algorithms for the maximum clique problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Some Lower Bounds in Parameterized AC^0

We demonstrate some lower bounds for parameterized problems via parameterized classes corresponding to the classical AC0. Among others, we derive such a lower bound for all fptapproximations of the parameterized clique problem and for a parameterized halting problem, which recently turned out to link problems of computational complexity, descriptive complexity, and proof theory. To show the fir...

متن کامل

Some lower bounds in parameterized ${\rm AC}^0$

We demonstrate some lower bounds for parameterized problems via parameterized classes corresponding to the classical AC. Among others, we derive such a lower bound for all fptapproximations of the parameterized clique problem and for a parameterized halting problem, which recently turned out to link problems of computational complexity, descriptive complexity, and proof theory. To show the firs...

متن کامل

Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks

Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many schemes, however, cannot resist coercion attacks where the user is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose cryptanalysis, are often the easiest way to defeat cryptography. We present a defense against coercion attacks using the concept of implicit learning from...

متن کامل

The Lovász θ function, SVMs and finding large dense subgraphs

The Lovász θ function of a graph, a fundamental tool in combinatorial optimization and approximation algorithms, is computed by solving a SDP. In this paper we establish that the Lovász θ function is equivalent to a kernel learning problem related to one class SVM. This interesting connection opens up many opportunities bridging graph theoretic algorithms and machine learning. We show that ther...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1707.00078  شماره 

صفحات  -

تاریخ انتشار 2017