Also Known As...
- hardness problems
- computational hardness assumption
- 1 Way Function
- Trapdoor Function
- a certain problem that is hard to efficiently (in ) compute, but easy to verify given a precomputed solution
- a mathematical operation which is computationally easy to compute, but hard to reverse
Strength of Hardness Assumptions
- if A is stronger than B, then A implies B (the converse is false or not known)
- i.e. if A is found to be false, B can still be true
Use Weakest Possible Assumption for Cryptography
- when designing a cryptographic protocol, one wants to use the weakest possible assumptions
Discrete Log Problem (DLP)
Not Post Quantum Safe
DLP is considered to be non-Post Quantum Safe
undefined`
(Computational) Diffie-Hellman Assumption (CDH)
- stronger than DLP
- given group elements , it is hard to find
- is a generator, and are random integers
- used in Diffie-Hellman Key Exchange
Decisional Diffie-Hellman Assumption (DDH)
- stronger than CDH
- if computing from was easy, then one could solve DDH problem trivially
- used in ElGamal Encryption (Cryptosystem)
Elliptic Curve Discrete Logarithm Problem (ECDLP)
- used in Elliptic Curve Diffie-Hellman Key Exchange (ECDH)
- relies on the hardness of finding the scalar multiple , where and both and are points on the elliptic curve defined over a finite field
Pairing Based / Decisional Diffie-Helman (DDH) Assumption
- assumption in a cyclic group with generator states that, given and for chosen uniformly and independently from , the value is computationally indistinguishable from a random group element
- Pairing Security
Integer Factorization Problem
Not Post Quantum Safe
DLP is considered to be non Post Quantum Safe
- instance of Hidden Subgroup Problem (HSP)
- given where , and are large primes, find and
- to find by brute force, use Number Field Sieve (NFS) Algorithm
- relies on hardness of factoring large numbers
RSA Problem
- Given , , , where , find
- problem is conjectured to be hard, but is easy given factorization of
- RSA Encryption (Cryptosystem)
Lattice Problems
Post Quantum Safe
Some Lattice Problems are considered to be Post Quantum Cryptography (Post Quantum Safe)
Shortest Vector Problem (SVP)
undefined
Closest Vector Problem (CVP)
undefined
Learning With Errors Problems (LWE)
- might be more appropriately named “approximate linear algebra modulo q”
- the problem is basically to solve systems of linear equations where the equations are only approximately true, and instead of solving for rational or real numbers, we’re solving for integers modulo q
- Given a number of approximate equations of the form:
- solve for where each is small
Ring Learning With Errors (RLWE)
Search Variant
- let Q be a big value
- let ring
- polynomials in have coefficients in and degree
- let be secret polynomial with coefficients from ternary distribution
- sample and sample error with coefficients from gaussian distribution
- given tuple:
- finding is hard