Deterministic encryption

A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a given plaintext and key, even over separate executions of the encryption algorithm. Examples of deterministic encryption algorithms include RSA cryptosystem (without encryption padding), and many block ciphers when used in ECB mode or with a constant initialization vector.

Leakage

Deterministic encryption can leak information to an eavesdropper, who may recognize known ciphertexts. For example, when an adversary learns that a given ciphertext corresponds to some interesting message, they can learn something every time that ciphertext is transmitted. To gain information about the meaning of various ciphertexts, an adversary might perform a statistical analysis of messages transmitted over an encrypted channel, or attempt to correlate ciphertexts with observed actions (e.g., noting that a given ciphertext is always received immediately before a submarine dive). This concern is particularly serious in the case of public key cryptography, where any party can encrypt chosen messages using a public encryption key. In this case, the adversary can build a large "dictionary" of useful plaintext/ciphertext pairs, then observe the encrypted channel for matching ciphertexts.

Applications

While deterministic encryption schemes can never be semantically secure, they have some advantages over probabilistic schemes.

Database searching of encrypted data

One primary motivation for the use of deterministic encryption is the efficient searching of encrypted data. Suppose a client wants to outsource a database to a possibly untrusted database service provider. If each entry is encrypted using a public-key cryptosystem, anyone can add to the database, and only the distinguished "receiver" who has the private key can decrypt the database entries. If, however, the receiver wants to search for a specific record in the database, this becomes very difficult. There are some Public Key encryption schemes that allow keyword search,[1][2] however these schemes all require search time linear in the database size. If the database entries were encrypted with a deterministic scheme and sorted, then a specific field of the database could be retrieved in logarithmic time.

Security

Assuming that a deterministic encryption scheme is going to be used, it is important to understand what is the maximum level of security that can be guaranteed.

A number of works have focused on this exact problem. The first work to rigorously define security for a deterministic scheme was in CRYPTO 2007.[3] This work provided fairly strong security definitions (although weaker than semantic security), and gave constructions in the random oracle model. Two follow-up works appeared the next year in CRYPTO 2008, giving definitional equivalences and constructions without random oracles.[4][5]

Alternatives to deterministic encryption

To counter this problem, cryptographers proposed the notion of "randomized" or probabilistic encryption. Under these schemes, a given plaintext can encrypt to one of a very large set of possible ciphertexts, chosen randomly during the encryption process. Under sufficiently strong security guarantees the attacks proposed above become infeasible, as the adversary will be unable to correlate any two encryptions of the same message, or correlate a message to its ciphertext, even given access to the public encryption key. This guarantee is known as semantic security or Ciphertext indistinguishability, and has several definitions depending on the assumed capabilities of the attacker (see semantic security).

gollark: 𝔒𝔯 𝔱𝔥𝔦𝔰 𝔞𝔠𝔱𝔲𝔞𝔩𝔩𝔶.
gollark: 𝓣𝓱𝓲𝓼 𝓲𝓼 𝔀𝓮𝓲𝓻𝓭𝓮𝓻, 𝓪𝓻𝓰𝓾𝓪𝓫𝓵𝔂.
gollark: Me? I haven't but should.
gollark: Time travel.
gollark: DURING YOUR AWARD SPEECĦ, demand they turn it down.

See also

References

  1. Gu, Chunxiang; Zhu, Yuefei; Zhang, Yajuan (2006). "Efficient Public Key Encryption with Keyword Search Schemes from Pairings" (PDF). Retrieved 3 March 2015. Cite journal requires |journal= (help)
  2. Michel, Abdalla; et al. (2005). "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions". Crypto 2005: 205–222.
  3. Bellare, Mihir; Boldyreva, Alexandra; O'Neill, Adam (2007). "Deterministic and Efficiently Searchable Encryption". Advances in Cryptology - CRYPTO 2007. 4622 (Lecture Notes in Computer Science): 535–552. doi:10.1007/978-3-540-74143-5_30.
  4. Boldyreva, Alexandra; Fehr, Serge; O’Neill, Adam (2008). Wagner, David (ed.). "On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles". Advances in Cryptology – CRYPTO 2008. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 335–359. doi:10.1007/978-3-540-85174-5_19. ISBN 978-3-540-85174-5.
  5. Bellare, Mihir; Fischlin, Marc; O’Neill, Adam; Ristenpart, Thomas (2008). Wagner, David (ed.). "Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles". Advances in Cryptology – CRYPTO 2008. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 360–378. doi:10.1007/978-3-540-85174-5_20. ISBN 978-3-540-85174-5.
  • Mihir Bellare and Alexandra Boldyreva and Adam O'Neill, Deterministic and Efficiently Searchable Encryption, CRYPTO 2007
  • Alexandra Boldyreva and Serge Fehr and Adam O'Neill, On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles, CRYPTO 2008
  • Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart, Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, CRYPTO 2008
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.