Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Security level

From Wikipedia, the free encyclopedia
(Redirected fromSecurity strength)
This article is about strength in cryptography. For business security policy, seesecurity level management.
Measure of cryptographic strength

In cryptography,security level is a measure of the strength that acryptographic primitive — such as acipher orhash function — achieves. Security level is usually expressed as a number of "bits of security" (alsosecurity strength),[1] wheren-bit security means that the attacker would have to perform 2n operations to break it,[2] but other methods have been proposed that more closely model the costs for an attacker.[3] This allows for convenient comparison between algorithms and is useful when combining multiple primitives in ahybrid cryptosystem, so there is no clear weakest link. For example,AES-128 (key size 128 bits) is designed to offer a 128-bit security level, which is considered roughly equivalent to aRSA using 3072-bit key.

In this context,security claim ortarget security level is the security level that a primitive was initially designed to achieve, although "security level" is also sometimes used in those contexts. When attacks are found that have lower cost than the security claim, the primitive is consideredbroken.[4][5]

In symmetric cryptography

[edit]

Symmetric algorithms usually have a strictly defined security claim. Forsymmetric ciphers, it is typically equal to thekey size of the cipher — equivalent to thecomplexity of abrute-force attack.[5][6]Cryptographic hash functions with output size ofn bits usually have acollision resistance security leveln/2 and apreimage resistance leveln. This is because the generalbirthday attack can always find collisions in 2n/2 steps.[7] For example,SHA-256 offers 128-bit collision resistance and 256-bit preimage resistance.

However, there are some exceptions to this. ThePhelix and Helix are 256-bit ciphers offering a 128-bit security level.[5][8] The SHAKE variants ofSHA-3 are also different: for a 256-bit output size, SHAKE-128 provides 128-bit security level for both collision and preimage resistance.[9]

In asymmetric cryptography

[edit]
See also:Key size § Asymmetric algorithm key lengths

The design of most asymmetric algorithms (i.e.public-key cryptography) relies on neatmathematical problems that are efficient to compute in one direction, but inefficient to reverse by the attacker. However, attacks against current public-key systems are always faster thanbrute-force search of the key space. Their security level isn't set at design time, but represents acomputational hardness assumption, which is adjusted to match the best currently known attack.[6]

Various recommendations have been published that estimate the security level of asymmetric algorithms, which differ slightly due to different methodologies.

  • For theRSA cryptosystem at 128-bit security level,NIST andENISA recommend using 3072-bit keys[10][11] andIETF 3253 bits.[12][13] The conversion from key length to a security level estimate is based on the complexity of theGNFS.[14]: §7.5 
  • Diffie–Hellman key exchange and DSA are similar to RSA in terms of the conversion from key length to a security level estimate.[14]: §7.5 
  • Elliptic curve cryptography requires shorter keys, so the recommendations for 128-bit are 256-383 (NIST), 256 (ENISA) and 242 bits (IETF). The conversion from key sizef to security level is approximatelyf / 2: this is because the method to break the Elliptic CurveDiscrete Logarithm Problem, the rho method, finishes in 0.886 sqrt(2f) additions.[15]

Typical levels

[edit]

The following table are examples of typical security levels for types of algorithms as found in s5.6.1.1 of the US NIST SP-800-57 Recommendation forKey Management.[16]: Table 2 

Comparable Algorithm Strengths
Security BitsSymmetric KeyFinite Field/Discrete Logarithm
(DSA, DH, MQV)
Integer Factorization
(RSA)
Elliptic Curve
(ECDSA, EdDSA, ECDH, ECMQV)
802TDEA[a]L = 1024,N = 160k = 1024160 ≤f ≤ 223
1123TDEA[a]L = 2048,N =224k = 2048224 ≤f ≤ 255
128AES-128L = 3072,N = 256k = 3072256 ≤f ≤ 383
192AES-192L = 7680,N = 384k = 7680384 ≤f ≤ 511
256AES-256L = 15360,N = 512k = 15360f ≥ 512
  1. ^abDEA (DES) was deprecated in 2003 in the context of NIST recommendations.

Under NIST recommendation, a key of a given security level should only be transported under protection using an algorithm of equivalent or higher security level.[14]

The security level is given for the cost of breaking one target, not the amortized cost for group of targets. It takes 2128 operations to find a AES-128 key, yet the same number of amortized operations is required for any numberm of keys. On the other hand, breakingm ECC keys using the rho method require sqrt(m) times the base cost.[15][17]

Meaning of "broken"

[edit]

A cryptographic primitive is considered broken when an attack is found to have less than its advertised level of security. However, not all such attacks are practical: most currently demonstrated attacks take fewer than 240 operations, which translates to a few hours on an average PC. The costliest demonstrated attack on hash functions is the 261.2 attack onSHA-1, which took 2 months on 900GTX 970 GPUs, and cost US$75,000 (although the researchers estimate only $11,000 was needed to find a collision).[18]

Aumasson draws the line between practical and impractical attacks at 280 operations. He proposes a new terminology:[19]

  • Abroken primitive has an attack taking ≤ 280 operations. An attack can be plausibly carried out.
  • Awounded primitive has an attack taking between 280 and around 2100 operations. An attack is not possible right now, but future improvements are likely to make it possible.
  • Anattacked primitive has an attack that is cheaper than the security claim, but much costlier than 2100. Such an attack is too far from being practical.
  • Finally, ananalyzed primitive is one with no attacks cheaper than its security claim.

Quantum attacks

[edit]

The field ofpost-quantum cryptography considers the security level of cryptographic algorithms in the face of a hypothetical attacker possessing aquantum computer.

  • Most quantum attacks on symmetric ciphers provide a square-root speedup to their classical counterpart, thereby halving the security level provided. (The exception is theslide attack withSimon's algorithm, though it has not proved useful in attacking AES.) For example, AES-256 would provide 128 bits of quantum security, which is still considered plenty.[20][21]
  • Shor's algorithm promises a massive speedup in solving the factoring problem, the discrete logarithm problem, and the period-finding problem, so long as a sufficiently large quantum computer on the order of millions of cubits is available. This would spell the end of RSA, DSA, DH, MQV, ECDSA, EdDSA, ECDH, and ECMQV in their current forms.[22]

Even though quantum computers capable of these operations have yet to appear, adversaries of today may choose to "harvest now, decrypt later": to store intercepted ciphertexts so that they can be decrypted when sufficiently powerful quantum computers become available. As a result, governments and businesses have already begun work on moving to quantum-resistant algorithms. Examples of these effort include Google and Cloudflare's tests of hybrid post-quantum TLS on the Internet and[23] NSA's release ofCommercial National Security Algorithm Suite 2.0 in 2022.

References

[edit]
  1. ^NIST Special Publication 800-57 Part 1, Revision 5. Recommendation for Key Management: Part 1 – General, p. 17.
  2. ^Lenstra, Arjen K."Key Lengths: Contribution to The Handbook of Information Security"(PDF).
  3. ^Bernstein, Daniel J.;Lange, Tanja (4 June 2012)."Non-uniform cracks in the concrete: the power of free precomputation"(PDF).Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. pp. 321–340.doi:10.1007/978-3-642-42045-0_17.ISBN 978-3-642-42044-3.
  4. ^Aumasson, Jean-Philippe (2011).Cryptanalysis vs. Reality(PDF).Black Hat Abu Dhabi.
  5. ^abcBernstein, Daniel J. (25 April 2005).Understanding brute force(PDF). ECRYPT STVL Workshop on Symmetric Key Encryption.
  6. ^abLenstra, Arjen K. (9 December 2001)."Unbelievable Security: Matching AES Security Using Public Key Systems"(PDF).Advances in Cryptology — ASIACRYPT 2001. Lecture Notes in Computer Science. Vol. 2248. Springer, Berlin, Heidelberg. pp. 67–86.doi:10.1007/3-540-45682-1_5.ISBN 978-3-540-45682-7.
  7. ^Alfred J. Menezes;Paul C. van Oorschot;Scott A. Vanstone."Chapter 9 - Hash Functions and Data Integrity"(PDF).Handbook of Applied Cryptography. p. 336.
  8. ^Ferguson, Niels; Whiting, Doug; Schneier, Bruce; Kelsey, John; Lucks, Stefan; Kohno, Tadayoshi (24 February 2003)."Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive"(PDF).Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2887. Springer, Berlin, Heidelberg. pp. 330–346.doi:10.1007/978-3-540-39887-5_24.ISBN 978-3-540-20449-7.
  9. ^Dworkin, Morris J. (August 2015).SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions(PDF) (Report). NIST. p. 23.doi:10.6028/nist.fips.202.
  10. ^Barker, Elaine (2020).Recommendation for Key Management, Part 1 -- General(PDF) (Report). NIST. NIST. pp. 54–55.doi:10.6028/NIST.SP.800-57pt1r5.
  11. ^Algorithms, key size and parameters report – 2014. ENISA. Publications Office. 2013. p. 37.doi:10.2824/36822.ISBN 978-92-9204-102-1.{{cite book}}: CS1 maint: others (link)
  12. ^Orman, Hilarie; Hoffman, Paul (April 2004).Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC. IETF.doi:10.17487/RFC3766.
  13. ^Giry, Damien."Keylength - Compare all Methods".keylength.com. Retrieved2017-01-02.
  14. ^abc"Implementation Guidance for FIPS 140-2 and the Cryptographic Module Validation Program"(PDF).
  15. ^ab"The rho method". Retrieved21 February 2024.
  16. ^Barker, Elaine (May 2020).Recommendation for Key Management, Part 1: General(PDF) (Report). NIST. NIST. p. 158.CiteSeerX 10.1.1.106.307.doi:10.6028/nist.sp.800-57pt1r5.
  17. ^"After ECDH with Curve25519, is it pointless to use anything stronger than AES-128?".Cryptography Stack Exchange.
  18. ^Gaëtan Leurent; Thomas Peyrin (2020-01-08).SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust(PDF) (Report). IACR Cryptology ePrint Archive.
  19. ^Aumasson, Jean-Philippe (2020).Too Much Crypto(PDF). Real World Crypto Symposium.
  20. ^Bonnetain, Xavier; Naya-Plasencia, María; Schrottenloher, André (11 June 2019)."Quantum Security Analysis of AES".IACR Transactions on Symmetric Cryptology.2019 (2):55–93.doi:10.13154/tosc.v2019.i2.55-93.
  21. ^O'Shea, Dan (April 26, 2022)."AES-256 joins the quantum resistance".Fierce Electronics. RetrievedSeptember 26, 2023.
  22. ^WOHLWEND, JEREMY (2016)."ELLIPTIC CURVE CRYPTOGRAPHY: PRE AND POST QUANTUM"(PDF).
  23. ^Bernstein, Daniel J. (2024-01-02)."Double encryption: Analyzing the NSA/GCHQ arguments against hybrids. #nsa #quantification #risks #complexity #costs".

Further reading

[edit]
  • Aumasson, Jean-Philippe (2020).Too Much Crypto(PDF). Real World Crypto Symposium.

See also

[edit]
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Security_level&oldid=1310933603"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp