CMSC 414 Computer and Network Security Lecture 3

Slides:



Advertisements
Similar presentations
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Advertisements

CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
CIS 5371 Cryptography 3b. Pseudorandomness.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CMSC 456 Introduction to Cryptography
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CS526Topic 3: One-time Pad and Perfect Secrecy 1 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream.
Cryptography Lecture 8 Stefan Dziembowski
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Giuseppe Bianchi Warm-up example 1 found on a real paper! Warm-up example 1 found on a real paper!
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Modern symmetric-key Encryption
Secrecy of (fixed-length) stream ciphers
Cryptography Lecture 3.
Cryptography Lecture 12.
B504/I538: Introduction to Cryptography
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
Cryptography Lecture 4.
Topic 5: Constructing Secure Encryption Schemes
B504/I538: Introduction to Cryptography
Cryptography Lecture 5.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
Cryptography Lecture 6.
B504/I538: Introduction to Cryptography
Cryptography Lecture 7.
B504/I538: Introduction to Cryptography
Cryptography Lecture 11.
Cryptography Lecture 4.
Cryptography Lecture 5.
Cryptography Lecture 8.
Cryptography Lecture 12.
Cryptography Lecture 6.
Information Security CS 526 Topic 3
Cryptography Lecture 7.
Cryptography Lecture 3.
Cryptography Lecture 11.
Cryptography Lecture 10.
Cryptography Lecture 6.
2. Perfect Secret Encryption
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz

JCE (The TA gave a brief presentation in class about the JCE and how to use it)

HW1 out Meant to get you familiar with the JCE, and some basic crypto Use your GRACE account Work in teams of two students Both students should contribute to all problems JCE use and syntax fair game for the exam We now have a class forum Post on the forum if you are looking for a partner

Computer security student club First meeting tomorrow night, 7PM, in CSIC 1115

Perfect secrecy

Defining secrecy (take 1) Even an adversary running for an unbounded amount of time learns nothing about the message from the ciphertext (Except the length) Perfect secrecy Formally, for all distributions over the message space, all m, and all c: Pr[M=m | C=c] = Pr[M=m]

The one-time pad Scheme Proof of security

Properties of the one-time pad? Achieves perfect secrecy No eavesdropper (no matter how powerful) can determine any information whatsoever about the plaintext (Essentially) useless in practice… Long key length Can only be used once (hence the name!) Insecure against known-plaintext attacks These are inherent limitations of perfect secrecy

Computational secrecy

Computational secrecy We can overcome the limitations of perfect secrecy by (slightly) relaxing the definition Instead of requiring total secrecy against unbounded adversaries, require secrecy against time-bounded adversaries except with some small probability E.g., secrecy for 100 years, except with probability 2-80 How to define formally?

A simpler characterization Perfect secrecy is equivalent to the following, simpler definition: Given a ciphertext C which is known to be an encryption of either M0 or M1, no adversary can guess correctly which message was encrypted with probability better than ½ Computational security! Is this definition too strong? Why not? running for 100 years + 2-80

The take-home message Weakening the definition slightly allows us to construct much more efficient schemes! Strictly speaking, no longer 100% absolutely guaranteed to be secure Security of encryption now depends on security of building blocks (which are analyzed extensively, and are believed to be secure) Given enough time and/or resources, the scheme can be broken

A computationally secure scheme A pseudorandom (number) generator (PRNG) is a deterministic function that takes as input a seed and outputs a string To be useful, the output must be longer than the seed If seed chosen at random, output of the PRNG should “look random” (i.e., be pseudorandom)

Notes Required notion of pseudorandomness is very strong – must be indistinguishable from random for all efficient algorithms General-purpose PRNGs not sufficient for crypto Pseudorandomness of the PRNG depends on the seed being chosen “at random” Note in particular that if a seed is re-used then the output of the PRNG remains the same! In practice: from physical processes and/or user behavior

A computationally secure scheme The pseudo-one-time pad… Proof sketch Which drawback(s) of the one-time pad does this address?