Disclaimer: Cryptography is a minefield, and the following article may very well contain errors. Beware of them, when you read it, but I am positive that at least the gist of it should be correct.
Note: This page uses mathml (part of html5). Some legacy-browsers (notably Google Chrome) that don’t care about standards may therefore only show TeX-formulas in place of actual formulas. If this is the case for you, simply use a somewhat modern browser like Firefox.
Since I’ve recently found quite a bit of missinformation on a certain topic, even in places where you really, really do not want to find it, I’ve figured that I should write a bit about it. The topic in question is “How to choose a group and a generator for DLog/CDH/DDH-based Cryptography?”. Given that the most widely used cryptographic primitves (with exception of RSA-based-stuff) fall within that category this is certainly important. I should however note that the state-of-the-art for them is to use elliptic curves, which kindof avoid these issues since you would normally use standardized groups instead of generating them yourself.
Before we start into looking into the issue it might be a good idea to reiterate how these schemes work. We will start with a very naive and insecure version of the Diffie-Hellman-Key-Exchange (DH-KX) and improve it from there, After that we will take a short look at ElGamal-Encryption.
In the beginning we need to choose a group . For this we will take some prime-number and look at the multiplicative group of it’s associated ressidue-class. (Sorry for the math-terms.)
To give a specific example let’s look at . This means the the group we would work with would be . It looks like this:
The naive and insecure DH-KX now takes a generator from that group (a generator is an element that generates the entire group, meaning that it’s powers are all the group-elements). In our specific example we might use . After that both Alice and Bob pick a random number between 2 and , for example and .
Then they compute their public information as and and send it to each other.
Alice will now compute and Bob computes .
These will always be the same because:
The idea is that can now serve as a shared secret between Alice and Bob that they will use to encrypt their communication with a symmetric cipher. But is it safe?
If we look at and check how many elements it generates, the number we find is 3: 1 (trivial), itself (also trivial) and 11. Let’s take the role of Eve (the attacker) at this point: We don’t know what the secrets of Alice and Bob are, but it is relatively easy to figure out if either and only generate very few elements. Since this is the case for and since the shared secret must be generated from (and ) we know that we only need to search in the subgroup generated by each, allowing us to vastly reduce the number of possible shared secrets. In the end we can than just run a brute-force-attack against the remaining ones.
This is a so called Small-Subgroup-Attack and the danger of one always exists if has small subgroups. To protect against it, we need to figure out when such subgroups exist. For this we will start with the following theorem:
All cyclic groups of the same order are isomorphic.
In English this means that for every size, there really is only one group with a generator. All different representations only rename the elements. (In cryptography we hope that figuring out how to undo the renaming is a hard problem.) What follows is that we can simply look at additive groups if we want to figure out which elements are generators.
It turns out that all elements that are neither the neutral element (“0” in this case since we are now looking at additive groups) nor share a nontrivial divisor with the group-size (GCD = 1) will generate the entire group. In case of Groups with prime-order this is true for all elements except 0.
This leads to the obvious question why 19 doesn’t work, since it is a prime.
The problem here is that we are not using the additive, but the multiplicaive group that happens to not contain , since there is no element in the group such that . This leaves us with elements. Unless (From now on I will ignore these corner-cases which only appear for very small primes), this means that the group order does have two divisors that it can share with some of it’s elements: 2 and . This means that we cannot simply take any prime-number and any generator, since there definitely are small subgroups.
To figure out a solution we need another property of those groups: If is a prime-divisor of the group-order, then there will be a subgroup that contains exactly elements that generate that subgroup. Together with the neutral-element, this gives us a group of order .
1 is somewhat special in that it will always divide the group-size, but there is still one element that generates it’s entire subgroup, namely 1 itself.
In our setting 2 will always be a prime-factor of , therefore there will be a subgroup with two elements, that don’t generate anything besides themselves. Obviously the neutral element (“1”) is in that subgroup, the other element is “-1” (in our case: ).
If the size of is sufficiently large, the probability of running into either of those cases is so small, that we usually don’t care about it. (It is about as low as the chance of guessing the secret-key derived from it in the first try.)
This means that it is crucial to get the factorization of , if we want to get the full picture. If has many small prime-factors, we are clearly in the realm of small-subgroup-attacks. In the case of this is true: .
If is however a prime-number, this means that there will be a subgroup with elements of order that generate exactly that subgroup. While these only make up halve the group, it’s no problem if we end up in it, since it is still huge if is sufficiently large. In contrast to the original group it does however have the advantage that all it’s elements (except “1”) generate the entire group. This means aside from the trivial subgroup (the one that only contains “1”) there are no subgroups that can cause problems. For this reason we call a prime with that property (, prime) “safe-primes”; their smaller counterparts are called Sophie-Germain-primes. The completely overused textbook-example for a safe-prime is 23 (), since it has just the right size to get an idea for how it’s residue-classes behave. On an unrelated sidenote, it might be interessting that it is also a Sophie-Germain-prime, since 47 is prime as well.
At this point we should define clearly the first security-assumption that we want to use, the so called Computational-Diffie-Hellman-Assumption (CDH):
Given just , and it is unfeasable to compute .
As of now, there are no feasable pre-quantum attacks on that assumption for groups with the just described structure (, and are prime-numbers) if and and is large enough. This leads a shocking amount of people to the following conclusion:
Great, so we can use this Group for a Key-Exchange with any generator besides 1 and -1 And use the resulting shared-secret as key for symmetric encryption, Right?
If you throw the result through a Hash-Function that you modell as Random-Oracle (and if you ignore all the cryptographers that hate the Random-Oracle-Modell), this might be the case. If you don’t use a hash-function, the situation gets more complicated: In practive with real-world ciphers, this will realisticly speaking also work, but if you have issues in other places as well, things might start breaking a lot sooner then you might excpect. (I can for example construct an (admittedly artificial) combination of an IND-CPA-secure cipher and an OW-CPA-secure key-exchange that have a plaintext-extraction-vulnerability, where the attack is always successfull und runs in constant time.)
To get a better idea for the real issue (and to get rid of the symmetric-black-box), let’s look at the ElGamal-encryption-scheme. ElGamal is a scheme that has many very nice properties:
The scheme works like this:
In essence this is a DH-KX where we just multiply the plaintext to the shared key. Decryption is then done by dividing (strictly speaking multiplying with the “inverse” is not divission, but it is close enough for this article) that ciphertext by the shared key. (Imagine it as a regular DH-KX where we use a one-time-pad for the symmetric part.)
It is easy to proof that this is a secure encryption-scheme, if we add another assumption into the mix, the so called Decissional-Diffie-Hellman-Assumption (DDH):
Given just , , and , where is randomly choosen to either be the product of and or some other random number (likelihood for either: 50%). Then it is unfeasable to be substantially better at deciding which it as than just making random guesses.
This is a stronger assumption than CDH, which means that it is possible for it to be wrong when CDH is true, but not the other way around.
I stated previously that we assume the CDH-assumption for our group, which of course now asks for the question whether the DDH-assumption also holds for it. The short answer is no, the long answer is that there is an efficient attack.
It is possible to figure out the order of all group-elements1, which will be either or (let’s ignore 1 and -1 for now). The elements with order do in fact have a name: quadratic residues or just squares. The later term already points into the right direction for how they are defined: A group element is a square if there is another group-element such that . This is obviously true for all numbers that are squares when viewed as natural numbers, but since we are looking at residues, there are quite a few more. To give a specific example: When looking at , then 2 is a square because (mod 23).
Let for now be a generator of the entire group. In this case an element is a square if and only if is an even number: . Since half the possible exponents are even, this shows that exactly half the elements of the group are squares.
With that knowledge consider some instances of the DDH-challenge:
These are four of eight cases, making up exactly 50% of the challenges. We can now construct the following attacker against DDH:
The chance of being right for this attacker is which is substantially above . Therefor the DDH-assumption is wrong for this group.
The impact of this on ElGamal is subtle but potentially critical: While it is still not possible to figure out the whole plaintext, an attacker has a good chance to learn whether the plaintext is a square. From a theoretical perspective this is completely unacceptable since it means that El-Gamals formal security guarantee drops from IND-CPA (INDistinguishability under Chosen-Plaintext-Attacks) to OW-CPA (One-Way under Chosen-Plaintext-Attacks). Where the first is perfectly fine for a building-block in many applications2, the later is pretty much useless.
“Okay, so we have identified a theoretical weakness, but this is certainly not relevant in practive, right? Those pesky people from academia simply don’t understand the needs of the real world and we’ve done pretty well with ignoring them in the past, right?”
Sometimes you get the feeling that this is what the industry is actually thinking, when you look at some of the past crypto-disasters. In order to convince you that the problem is real and potentially devestating, I will present to you a protocoll that is provably secure if you use a group in which DDH is hard, but breaks completely if this is not the case.
Before we look at the attack, I have to point out that this is a simplified version of the actual protocoll, where almost everything that distracts from the attack has been stripped out. Most of those things are required for security as well, but they wouldn’t solve the issue at hand. Another thing that has been stripped out for the same reason is the ability to vote for anyting but yes and no.
To be fair: The reasons why I like this algorithm so much has a lot to do with how easy it is to fix all the problems that this version doesn’t cover, but doing so would distract from the important point: Assume that the generator is choosen badly, aka it generates a group in which it is possible to distinguish squares and non-squares. Assume further that the public-key is a non-square. We now have four cases for the users randomness and vote:
This is pretty much the absolute worst-case: Every single vote is public and can be identified immedietly.
I want to point out one further thing about this protocoll: Unlike many counterexamples that you encounter in cryptography, this one was not designed to be broken and doesn’t do anything out of the ordinary. Nonetheless it breaks down in one of the worst ways possible if you make the apparently innocent change of picking a bad generator.
The good news is that there are fool-proof ways to pick a suitable generator.
If you do what I strongly recommend you to do and use a safe-prime, you can use 4 as a generator. Since it is a square in the natural numbers, it is a square in all residue-classes that contain it as well. There are other ways as well, but this is the easiest and most fool-proof one.
If for some reason you did not pick a safe-prime, figure out the largest prime-divisor of . It must be sufficiently large to be secure agains brute-force and generic attacks (256 Bit is about the minimum you should use). Then pick a random element from the entire group and compute . will now be a generator of the subgroup with elements. This is less trivial then the case for the safe-primes and encoding your messages as group-elements will definitely be more complicated as well (I’m however not going to cover the reason here), but it is at least better then the alternatives.
A post like this would be only halve as interessting, if there were no widely used pieces of software that are affected by the problem. Unluckily I can inform you that the most widely used software is in fact affected. (I guess, that those who just want to watch the world burn, might consider it lucky.)
The problem is not just, that these libraries do it wrong and may occasionaly pick bad generators, they actually go out of their way to make sure that the generator is bad. The following is pasted directly from the code:
/*- * We generate DH parameters as follows * find a prime q which is prime_len/2 bits long. * p=(2*q)+1 or (p-1)/2 = q * For this case, g is a generator if * g^((p-1)/q) mod p != 1 for values of q which are the factors of p-1. * Since the factors of p-1 are q and 2, we just need to check * g^2 mod p != 1 and g^q mod p != 1. * * Having said all that, * there is another special case method for the generators 2, 3 and 5. * for 2, p mod 24 == 11 * for 3, p mod 12 == 5 <<<<< does not work for safe primes. * for 5, p mod 10 == 3 or 7 * * Thanks to Phil Karn for the pointers about the * special generators and for answering some of my questions. * * I've implemented the second simple method :-). * Since DH should be using a safe prime (both p and q are prime), * this generator function can take a very very long time to run. */ /* * Actually there is no reason to insist that 'generator' be a generator. * It's just as OK (and in some sense better) to use a generator of the * order-q subgroup. */
The second comment was added 15 years ago, but nobody bothered to fix it since then.
I have since opened a bug in the libressl-bugtracker that hasn’t seen any answers. I tried to do the same with openssl,
but apparently they don’t have a public bug-tracker that I could use and don’t seem to offer other reasonable ways to communicate [Update] but for some reason their bug-tracker didn’t work for me back then; whatever was the issue seems to be gone, so they got the same report now[/Update]. Since it didn’t work that way, I also told a friend of mine who told an openssl-developer, but apparently nothing came from it so far.
The summary is: If you are using either of those libraries, make sure that you replace the generator if you want to use the groups for anything but DH-KX.
Let and again be a safe-prime and it’s associated Sophier-Germain-Prime and the element in question. Then will have the value 1 if it generates a group of order , since all the elements will repeat after this point and since . If generates a group of order , there cannot be a since that would imply that the group already repeats and therefore has only order ; in reality the value will always be or simply put (we are looking at residues!), since it’s square must be one.↩
It is usually not acceptable as is for general-purpose-encryption, since it doesn’t prevent tempering with the plaintext. In general you will want IND-CCA2 (INDistinguishability under adaptive chosen-ciphertext-attacks) which is a strictly stronger guarantee. IND-CPA is still usefull however since it allows you to do many things that are by definition impossible with IND-CCA2-secure ciphers. These things are however clear-cut cases of experts-only. Finally you can easily make every IND-CPA-secure cipher IND-CCA2-secure if you add an appropriate signature to it.↩
This is one of the simplifications. In the real protocoll there is a relatively straightforward way to replace the authority with a group of people such that every single one of those would have to work together to attack the privacy of the vote and that an absolute majority would be necessary to prevent the publication of the result once the group has a chance to know the result. Finally there are ways to ensure that even if all members of the authority work together they cannot fake the result.↩
In reality they also have to attach a proof that they voted either yes or no, since it would otherwise be possible to vote multiple times with a single ciphertext.↩