Information Hiding & Digital Watermarking Tri Van Le.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Asymmetric-Key Cryptography
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Public Encryption: RSA
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer Security CS 426 Lecture 3
Public Key Model 8. Cryptography part 2.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
CIS 5371 Cryptography Introduction.
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
RSA Ramki Thurimella.
Lec. 5 : History of Cryptologic Research II
Information Hiding & Digital Watermarking Tri Van Le.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Midterm Review Cryptography & Network Security
Chapter 21 Public-Key Cryptography and Message Authentication.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Merkle-Hellman Knapsack Cryptosystem
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Lecture 2: Introduction to Cryptography
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA Partially funded by NSF.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Cryptography – Test Review
第四章 數位簽章.
第四章 數位簽章.
NET 311 Information Security
Cryptography Lecture 5.
Public-Key, Digital Signatures, Management, Security
Information Hiding & Digital Watermarking
Presentation transcript:

Information Hiding & Digital Watermarking Tri Van Le

Outlines Some history State of the art Research goals Possible approaches Research plan

Cryptography in the 80s Beginning time of open research A lot of schemes proposed Most of them soon broken

Broken Cryptosystems (I) Merkle Hellman Iterated Knapsack Lu-Lee Merlke Hellman Merlke Hellman Lu-Lee Adiga Shankar Adigar Shankar Nieder- reiter Neiderreiter Goodman McAuly Goodman McAuly Pieprzyk Pieprzyk Chor Rivest Chor Rivest Okamoto Okamoto Okamoto

Broken Cryptosystems (II) Matsumoto Imai Cade Yagisawa Matsumoto Imai CadeYasigawa TMKIF Tsujii, Itoh Matsumoto Kurosama Fujioka Luccio Mazzone Luccio Mazzone Kravitz Reed Kravitz Reed Rao Nam Rao Nam Low Degree CG 1982 High Degree CG 1988 Rivest Adleman Dertouzos Rivest Adleman Dertouzos Krawczyk Boyar

Broken Cryptosystems (III) Ong Schnorr Ong Schorr Ong Schnorr Shamir Ong Schorr Shamir Okamoto Shiraishi Okamoto Shiraishi

Proven Secure Cryptosystems (I) Shannon’s work (1949) –Mathematical proof of security –Information theoretic secrecy Enemy with unlimited power –Can compute any desired function

Proven Secure Cryptosystems (II) Rabin (81), Goldwasser & Micali (82) –Mathematical proof of security –Computational secrecy Enemy with limited time and space –Can run in polynomial time –Can use polynomial space

Information Hiding (state of the art) Similar to that of cryptography in 80s –Many schemes were proposed –Most of them were broken Use heuristic security –Subjective measurements –Assume very specific enemy

Broken Schemes (I)

Broken Schemes (II)

Broken Schemes (III)

Broken Schemes (IV)

Research Goals Fundamental way –Systematic research –Same as Shannon and Goldwasser’s work What have been done –Covert channels –Anonymous communications What are the properties

Fundamental Models Unconditional hiding –Unlimited enemy Statistical hiding –Polynomial samples Computational hiding –Polynomial time

What have been done Covert channels Anonymous communications Information hiding –Steganography –Digital watermarking

Covert Channels Leakage information (e.g. viruses) –Disk space –CPU load Subliminal channels –Digital signatures –Encryption schemes –Cryptographic malwares

Covert Computations Computation inside computations –Secret design calculations inside a factoring computation –Secret physics simulations inside a cryptographic software or devices

Anonymous Communications MIX Networks –Electronic voting –Anonymous communication Onion Routings –Limited anonymous communication Blind signatures –Digital cash

Information Hiding Steganography –Invisible inks –Small dots –Letters Digital watermarking –Common lossy compressions –Common signal processing operations

Information Hiding Hiding property –Output must look like the cover Secrecy –No partial information on input message Authenticity –Hard to compute valid output

Our Approaches Arbitrary key –Steganography, watermarking Restricted key –Protection of key materials Key = Ciphertext –Secret sharing

Research Plan To understand information hiding –Perfect hiding (done) Necessary and sufficient conditions Computational complexity results Constructions of prefect secure schemes Constructions of schemes with non-reliability –Computational hiding (under research) Conventional constructions Public key schemes

Research Plan Other aspects –Replacing privacy by authenticity Extra problem –Robustness against modifications

Thank you Questions? More details?

Approaches Arbitrary key distribution –E: K  M  C –K: key space –M: message space –C: cover space Requires –E(k,m) is distributed accordingly to P cover

Approaches Restricted key distribution –c = E(k,m) –k is distributed accordingly to P K –c is distributed accordingly to P Cover

Approaches Key = Ciphertext –S: M  C  C –(k 1,k 2 ) = S(m) Requires –k 1 and k 2 distributed accordingly to P Cover

Models Perfect hiding –P c = P cover –Ciphertext distributes exactly as P cover Statistical Hiding –|P c - P cover | is a negligible function Negligible function –f(n) 0 and n>N d.

Models Computational Hiding –P c and P cover are P-time indistinguishable –For all P-time P.T.M. M:  Prob(M(P c )=1) - Prob(M(P cover )=1)  is negligible.

Examples Quadratic residues –n = pq –S 1 = {x 2 |x in Z n * } –S 2 = {x|x in Z n * and J(x)=1} Decision Diffie-Hellman –U 1 = (g, g a, g b, g ab ) mod p –U 2 = (g, g a, g b, g r ) mod p