The Provable Security of Ed25519: Theory and Practice

被引:29
作者
Brendel, Jacqueline [1 ]
Cremers, Cas [1 ]
Jackson, Dennis [2 ]
Zhao, Mang [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP | 2021年
关键词
DIGITAL-SIGNATURES;
D O I
10.1109/SP40001.2021.00042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A standard requirement for a signature scheme is that it is existentially unforgeable under chosen message attacks (EUF-CMA), alongside other properties of interest such as strong unforgeability (SUF-CMA), and resilience against key substitution attacks. Remarkably, no detailed proofs have ever been given for these security properties for EdDSA, and in particular its Ed25519 instantiations. Ed25519 is one of the most efficient and widely used signature schemes, and different instantiations of Ed25519 are used in protocols such as TLS 1.3, SSH, Tor, ZCash, and WhatsApp/Signal. The differences between these instantiations are subtle, and only supported by informal arguments, with many works assuming results can be directly transferred from Schnorr signatures. Similarly, several proofs of protocol security simply assume that Ed25519 satisfies properties such as EUF-CMA or SUF-CMA. In this work we provide the first detailed analysis and security proofs of Ed25519 signature schemes. While the design of the schemes follows the well-established Fiat-Shamir paradigm, which should guarantee existential unforgeability, there are many side cases and encoding details that complicate the proofs, and all other security properties needed to be proven independently. Our work provides scientific rationale for choosing among several Ed25519 variants and understanding their properties, fills a much needed proof gap in modern protocol proofs that use these signatures, and supports further standardisation efforts.
引用
收藏
页码:1659 / 1676
页数:18
相关论文
共 62 条
[1]  
Abdalla M., 2002, Advances in Cryptology-EUROCRYPT 2002
[2]   LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage [J].
Aranha, Diego F. ;
Novaes, Felipe Rodrigues ;
Takahashi, Akira ;
Tibouchi, Mehdi ;
Yarom, Yuval .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :225-242
[3]  
Backendal M., 2018, ser. LNCS, V11252
[4]  
Bellare M., 2002, Advances in Cryptology-CRYPTO
[5]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[6]  
Bellare M., 2016, Advances in Cryptology-ASIACRYPT 2016
[7]   The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures [J].
Bellare, Mihir ;
Dai, Wei .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 :529-552
[8]  
Bergsma F., 2013, Cryptology ePrint Archive, Report 2013/813
[9]   Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol [J].
Bergsma, Florian ;
Dowling, Benjamin ;
Kohlar, Florian ;
Schwenk, Joerg ;
Stebila, Douglas .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :369-381
[10]  
Bernstein D. J., 2015, IACR Cryptology ePrint Archive, V2015