Perfect security Samuel Ranellucci Défacne de these Date

Slides:



Advertisements
Similar presentations
Oct 28, 2004WPES Off-the-Record Communication, or, Why Not to Use PGP Nikita Borisov Ian Goldberg Eric Brewer.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
SECURITY AND VERIFICATION Lecture 4: Cryptography proofs in context Tamara Rezk INDES TEAM, INRIA January 24 th, 2012.
Encryption Public-Key, Identity-Based, Attribute-Based.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Identity Based Encryption
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Practical Techniques for Searches on Encrypted Data Author:Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀汶承.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Rennes, 15/10/2014 Cristina Onete Message authenticity: Digital Signatures.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Cryptography Lecture 9 Stefan Dziembowski
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Introduction to Quantum Key Distribution
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Lecture 5.1: Message Authentication Codes, and Key Distribution
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
The Secure Channel Ramki Thurimella. 2 Secure Channel Properties Roles Alice—Bob (Server—Client) Direction of flow Eve Delete, Insert, or modify data.
On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Secret Key Cryptography
Topic 36: Zero-Knowledge Proofs
Encryption and Integrity
Computer Communication & Networks
Boneh-Franklin Identity Based Encryption Scheme
Public Key Encryption Systems
Authenticated encryption
Group theory exercise.
Homework 1 Due: Thursday at 9 AM (beginning of class)
Encryption
Basic Network Encryption
Modern symmetric-key Encryption
Introduction to security goals and usage of cryptographic algorithms
Digital signatures.
NET 311 Information Security
Introduction to modern cryptology
Topic 11: Authenticated Encryption + CCA-Security
MAC: Message Authentication Code
Cryptography Lecture 12.
OTR AKE Protocol.
Cryptography Lecture 10.
Security through Encryption
Introduction to Provable Security
Quantum Cryptography Scott Roberts CSE /01/2001.
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Chapter 29 Cryptography and Network Security
Basic Network Encryption
One Way Functions Motivation Complexity Theory Review, Motivation
Cryptography Lecture 9.
Cryptography Lecture 11.
Public Key Encryption Systems
Secure Diffie-Hellman Algorithm
Cipher-Based MAC Network Security.
How to Use Charm Crypto Lib
Presentation transcript:

Perfect security Samuel Ranellucci Défacne de these Date To many slides

Assumption Key is always assumed hidden from the adversary One-time means that the key is discarded after use

Overview One-time pad One-time mac Disavantages of perfect security

Trap game #1 Alice tells Bob either to go left or right Eve can then place trap on either Left side Right side Eve wins if trap placed is on the same side that Bob went

How eve can win game #1 Left Left Goes left Eve reads the message and places trap based on message Eve always wins.

Encryption When Alice and Bob want to hide messages from Eve. Prevents Eve from knowing where to put the trap.

Encryption scheme 𝐾𝑒𝑦𝑔𝑒𝑛( {1} 𝑠 )→𝒦 𝐸𝑛𝑐:𝒦×ℳ→𝒞 𝐷𝑒𝑐:𝒦×𝒞→ℳ 𝒦 ≔𝑆𝑒𝑐𝑟𝑒𝑡 𝐾𝑒𝑦 𝑠𝑝𝑎𝑐𝑒 ℳ ≔𝑀𝑒𝑠𝑠𝑎𝑔𝑒 𝑠𝑝𝑎𝑐𝑒 𝒞 ≔𝑐𝑖𝑝ℎ𝑒𝑟𝑡𝑒𝑥𝑡 𝑠𝑝𝑎𝑐𝑒 𝐾𝑒𝑦𝑔𝑒𝑛( {1} 𝑠 )→𝒦 𝐸𝑛𝑐:𝒦×ℳ→𝒞 𝐷𝑒𝑐:𝒦×𝒞→ℳ Correctness: 𝐷𝑒𝑐 𝑘,𝐸𝑛𝑐 𝑘,𝑚 =𝑚 Hiding property: comes in many flavors

One-time pad 𝒦 ≔ 0,1 𝑛 ℳ ≔ 0,1 𝑛 𝒞 ≔ 0,1 𝑛 𝑘𝑒𝑦𝑔𝑒𝑛 𝐸𝑛𝑐𝑟𝑦𝑝𝑡 Decrypt 𝒦 ≔ 0,1 𝑛 ℳ ≔ 0,1 𝑛 𝒞 ≔ 0,1 𝑛 𝑘𝑒𝑦𝑔𝑒𝑛 𝑘 ∈ 𝑅 0,1 𝑛 𝐸𝑛𝑐𝑟𝑦𝑝𝑡 𝐸𝑛𝑐 𝑘,𝑚 ≔𝑘⊕𝑚 Decrypt 𝐷𝑒𝑐 𝑘,𝑐 ≔𝑘⊕𝑐

Security one-time pad Correctness Perfect security 𝐷𝑒𝑐 𝑘,𝐸𝑛𝑐 𝑘,𝑚 = 𝐷𝑒𝑐 𝑘,𝐸𝑛𝑐 𝑘,𝑚 = 𝐷𝑒𝑐 𝑘,𝑘⊕𝑚 = 𝑘⊕𝑘⊕𝑚 = m Perfect security Pr 𝑚= 𝑚 1 𝐶=𝑐]=Pr⁡[𝑚= 𝑚 1 ]

Perfect security for 𝐧=𝟏 m=0 m=1 k=0 1 k=1 1

One-time pad vs Eve ????????? 𝑐=0 𝑘= ? 𝑘= ? 𝑚= ? 𝑐= ? 𝑐=0 𝑚= ? 𝑙𝑒𝑓𝑡→0 𝑘= ? 𝑚= ? 𝑐=0 𝑘= ? 𝑐= ? 𝑚= ? ????????? 𝑙𝑒𝑓𝑡→0 𝑟𝑖𝑔ℎ𝑡→1

Bob could go left ????????? 𝑐=0 𝑘=0 𝑘=0 𝑚=0 𝑐=0 𝑐=𝑘⊕𝑚=0 𝑚=𝑘⊕𝑐=0 𝑙𝑒𝑓𝑡→0 𝑟𝑖𝑔ℎ𝑡→1

Bob could go right ????????? 𝑐=0 𝑘=1 𝑘=1 𝑚=1 𝑐=1 𝑐=𝑘⊕𝑚=0 𝑚=𝑘⊕𝑐=1 𝑙𝑒𝑓𝑡→0 𝑟𝑖𝑔ℎ𝑡→1

Trap game #2 Eve places a trap Alice tells which side to go to Bob She knows where trap is Eve wins if Bob goes where the trap is

How eve can win game #2 Eve places trap on right side. Left Right Goes Right Eve places trap on right side. Eve replaces message Eve always wins.

Authentication Allows Bob to know that a message really came from Alice Prevents Eve from redirecting Bob towards the trap

Message authentication code 𝒦 ≔𝑆𝑒𝑐𝑟𝑒𝑡 𝑘𝑒𝑦 𝑠𝑝𝑎𝑐𝑒 ℳ ≔𝑀𝑒𝑠𝑠𝑎𝑔𝑒 𝑠𝑝𝑎𝑐𝑒 𝒯 ≔𝑇𝑎𝑔 𝑠𝑝𝑎𝑐𝑒 𝑘𝑒𝑦𝑔𝑒𝑛( {1} 𝑠 )→𝒦 mac :𝒦×ℳ→𝒯 𝑣𝑒𝑟𝑖𝑓𝑦 :𝒦×𝑀×𝒯→ 𝑎𝑐𝑐𝑒𝑝𝑡,𝑟𝑒𝑗𝑒𝑐𝑡 Properties correctness unforgability

One-time mac Correctness Unforgeability game 𝑣𝑒𝑟𝑖𝑓𝑦 𝑚,𝑘,𝑎𝑢𝑡ℎ 𝑚,𝑘 =𝑎𝑐𝑐𝑒𝑝𝑡 Unforgeability game Probability of winning the unforgability is negligible in the key size (exponentially decreasing) See next slide for game

Unforgeability game m 𝑘←𝑘𝑒𝑦𝑔𝑒𝑛() 𝑡←𝑚𝑎𝑐(𝑘,𝑚) t ( 𝑚 ′ ,𝑡′) Win if 𝑚≠𝑚′ 𝑣𝑒𝑟𝑖𝑓𝑦 𝑚 ′ , 𝑡 ′ =𝑎𝑐𝑐𝑒𝑝𝑡

Bit-mac b∈{0,1} 𝐾𝑒𝑦𝑔𝑒𝑛( {1} 𝑠 ) 𝑚𝑎𝑐(𝑘, 𝑏) 𝑣𝑒𝑟𝑖𝑓𝑦 𝑘,𝑏,𝑡 𝑘 1 , 𝑘 2 ∈ 𝑅 0,1 𝑠 𝑘←( 𝑘 1 , 𝑘 2 ) 𝑚𝑎𝑐(𝑘, 𝑏) 𝑘 1 , 𝑘 2 ←𝑘 (split key in two) 𝜏← 𝑘 1 ⋅𝑏⊕ 𝑘 2 𝑣𝑒𝑟𝑖𝑓𝑦 𝑘,𝑏,𝑡 𝑘 1 , 𝑘 2 ←𝑘 𝑎𝑐𝑐𝑒𝑝𝑡 𝑖𝑓 𝑡= 𝑘 1 ⋅𝑏⊕ 𝑘 2

MAC (expensive) 𝑚∈ 𝐹 𝑝 𝐾𝑒𝑦𝑔𝑒𝑛 1 𝑠 𝐴𝑢𝑡ℎ(𝑘, 𝑚) 𝑣𝑒𝑟𝑖𝑓𝑦 𝑘,𝑚,𝑡 𝐾𝑒𝑦𝑔𝑒𝑛 1 𝑠 𝐹 𝑝 : 𝑝 ≥ 2 𝑠 𝑘 1 , 𝑘 2 ∈ 𝑅 𝐹 𝑝 𝑘←( 𝑘 1 , 𝑘 2 ) 𝐴𝑢𝑡ℎ(𝑘, 𝑚) 𝑘 1 , 𝑘 2 ←𝑘 (split key in two) 𝑡← 𝑘 1 ∗𝑚+ 𝑘 2 (𝑚𝑜𝑑 𝑝) 𝑣𝑒𝑟𝑖𝑓𝑦 𝑘,𝑚,𝑡 𝑘 1 , 𝑘 2 ←𝑘 a𝑐𝑐𝑒𝑝𝑡 𝑖𝑓 t= 𝑘 1 ∗𝑚+ 𝑘 2 (𝑚𝑜𝑑 𝑝)

MAC (cheap) (make example clear) 𝑚∈ 𝑭 𝒑 𝒏 ( 𝑚 1 ,⋯ ,𝑚 𝑛 )←𝑚 𝑝 𝑚 𝑥 ≔ 𝑖=1 𝑛 𝑚 𝑖 ∗ 𝑥 𝑖 View message a polynomial 𝐾𝑒𝑦𝑔𝑒𝑛() 𝑘 1 , 𝑘 2 ∈ 𝑅 𝐹 𝑝 𝑘←( 𝑘 1 , 𝑘 2 ) 𝐴𝑢𝑡ℎ(𝑘, 𝑚) 𝑘 1 , 𝑘 2 ←𝑘 𝑡← 𝑝 𝑚 𝑘 1 + 𝑘 2 (𝑚𝑜𝑑 𝑝) 𝑣𝑒𝑟𝑖𝑓𝑦 𝑘,𝑚,𝑡 a𝑐𝑐𝑒𝑝𝑡 𝑖𝑓 𝑡= 𝑝 𝑚 𝑘 1 + 𝑘 2 (𝑚𝑜𝑑 𝑝)

Review Encryption: Hide the message from Eve Authentication: Allows Bob to verify that the message came from Alice Message can be perfectly encrypted using one- time pad Requires key as long as the message One-time mac 2s bits of keys can authenticate an arbitrary long message by viewing the message as a polynomial

Disadvantages of perfect security Perfect encryption key as long as message Perfect authentication 2s bits of key per message sent