Course summary COS 433: Crptography -Spring 2010 Boaz Barak.

Slides:



Advertisements
Similar presentations
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Advertisements

Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Cryptography and Network Security CSL 759 Shweta Agrawal.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Part 4  Software 1 Conclusion Part 4  Software 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 456 Introduction to Cryptography
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
CS 4/585: Cryptography Tom Shrimpton FAB
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Class 5 Channels and Preview CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Exam Review for First Half of C430 2 May pm in Huxley 308 Michael Huth 2 May pm in Huxley 308 Michael Huth.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
RSA Slides by Kent Seamons and Tim van der Horst
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
Topic 26: Discrete LOG Applications
Encryption and Integrity
Privacy & Security.
Public Key Encryption and Digital Signatures
Group theory exercise.
Digital signatures.
Cryptography Lecture 26.
Topic 11: Authenticated Encryption + CCA-Security
Cryptographic Hash Functions Part I
Cryptography Lecture 12.
Cryptography Basics and Symmetric Cryptography
Topic 5: Constructing Secure Encryption Schemes
Cryptography Lecture 27.
Cryptography and Security Fall 2009 Steve Lai
Topic 30: El-Gamal Encryption
CAS CS 538 Cryptography.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography Lecture 10.
Cryptography Lecture 24.
Cryptography Lecture 11.
Cryptographic Hash Functions Part I
Cryptography Lecture 14.
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Cryptography Lecture 14.
Basic of Modern Cryptography
Cryptography Lecture 9.
Cryptography Lecture 22.
Cryptography Lecture 11.
Cryptography Lecture 10.
Cryptography Lecture 21.
Cryptography Lecture 13.
Cryptography Lecture 15.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography Lecture 24.
Cryptography Lecture 27.
Cryptography Lecture 23.
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Course summary COS 433: Crptography -Spring 2010 Boaz Barak

This course was hard… …and it was (partly) my fault.

Goals for this course Balanced coverage of crypto: “appetizers, main course, and desserts” Develop “crypto-intuition”.. ..through hard work but with not too much “grunt work”

Coverage of crypto Classical ciphers (ceasar, enigma etc..), one-time pad, limitations of information-theoretic security. Pseudorandom generators and functions, CPA/CCA private and public key encryption, Message authentication codes and digital signatures, hash functions. Zero knowledge, multiparty secure computation (e-voting, a-auctions,..), private information retrieval, homomorphic encryption, quantum & crypto.

“Crypto intuition” “Paradoxical tradeoffs”: have the cake and eat it too: CPA/CCA security: hide all information about message, with a mathematical proof of security. Public key encryption: secure communication over an insecure channel. Digital signatures/MACs: authentication stronger than hand-written signatures. Secure multiparty computation: “virtual trusted party”, elections with ideal privacy and ideal accuracy. Homomorphic encryption: cloud computing without trust. Subtle issues: but often we get the cake in our face.. Subtle attacks against protocols using CPA instead of CCA security. Precise modeling of adversarial capabilities. Complex interaction of secure components (e.g. EtA vs AtE)

Classical vs. “Modern”/Rigorous crypto Build scheme (based on intuition, experience) Attempt to attack. Deploy If attack found then patch/restart Give security definition (partly uses intuition, experience) Build scheme Prove (under assumptions / ROM/ICM heuristics) satisfies definition. Refine: More efficient,better analysis. If attack found then either: Assumption violated. Model doesn’t capture reality. Main difference: security definitions separation of modeling and construction enable rigorous analysis comparison of schemes  make progress art  science  refine/restart

What we didn’t do: More coverage of authentication protocols: Much of crypto use: “handshake” protocol using public key crypto to obtain private key k Use key k to establish communication channel with confidentiality and integrity. (MACs+private key crypto) Different scenarios: symmetric case (both sides have public keys) One-sided (only server has public key) Password-Authenticated-Key-Exchange - low entropy password - protocols, salt/pepper/slow hash etc.. Tokens / smartcards (e.g. secureID) Didn’t do enough: definitions (often simulation based), protocols, insecure examples , case studies (SSL,IPSec,GSM,wi-fi)

What we didn’t do: More examples of widely used or important constructions, standards Only mentioned El-Gamal encryption. Standard padding schemes for RSA, analysis of OAEP. Standard protocols. Digital signature standard. Cramer-Shoup encryption and signatures. Elliptic curve variants of Diffie-Hellman / El-Gamal More block ciphers, modes of encryption. Constructions of hash functions. Concrete multiparty protocols: set intersection, voting. Moderately hard functions – salts / fighting spam. Lattice / Error-Correcting-Codes based public key cryptography.

What we didn’t do: Key sizes, concrete security Attacks: Reductions: Factoring and discrete log subexponential algorithms: Quadratic/Number Field Sieve, Pollard’s rho method. Attacks on private key crypto. Reductions: Concrete analysis: (T,²) security, tighter reductions. Derive key size from reduction.

What we didn’t do: Other issues in cryptography: Identity based encryption: keys: (PUBmaster,PRIVmaster) ename = DERIVE(PUBmaster,name) dname = DERIVE(PRIVmaster,name) example: name = “boaz@princeton.edu#2010-04-28” Crypto using the Weil pairing Forward security: break in time t cannot violate security in time t’<t Entropy seeding in pseudorandom generators. Key leakage and side channel attacks.

Some of what we did: Rigorous definitions of security of basic crypto primitives: CPA/CCA/CMA. Importance of right definition: CCA vs CPA. Web of reductions between crypto primitives (e.g., PRFs from PRGs, length reduction for MACs, Goldreich-Levin theorem, signature schemes from one-way functions + collision resistant hash functions) High-level goals using basic primitives (e.g. authentication) Basic number theory and RSA/Rabin trapdoor permutations. Random oracle model Zero Knowledge and its use for identification protocols. Multiparty secure computation, and GMW compiler. Homomorphic encryption.

Final Exam All material covered in course (lectures+homework), except quantum. Most likely: 4-5 questions totaling 120 points. Can be downloaded starting Monday May 3, must be completed before min{ time download + 48 hours, Fri May 14 2pm } Can use your notes, homework, my handouts, textbooks (Katz-Lindell, Boneh-Shoup, Trevisan’s lectures). Nothing more. Sufficient time to solve, write, review&polish. Not sufficient to review material. Before you start go over: (1) lecture notes (2) your homework and AI’s comments. Can prepare summary in advance, also in a group.

Good luck! My office hours Friday 10:30-12pm Review precept: Saturday 1:30pm. Email me/Sushant/Shi Questions??