Shannon Secrecy CSCI284/162 Spring 2009 GWU.

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Advertisements

Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Classical Cryptography 1. Introduction: Some Simple Cryptosystems.
Ref. Cryptography: theory and practice Douglas R. Stinson
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CryptographyPerfect secrecySlide 1 Today What does it mean for a cipher to be: –Computational secure? Unconditionally secure? Perfect secrecy –Conditional.
Chapter 2 Basic Encryption and Decryption (part B)
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
1 Set Theory. Notation S={a, b, c} refers to the set whose elements are a, b and c. a  S means “a is an element of set S”. d  S means “d is not an element.
1 Number Theory and Methods of Proof Content: Properties of integer, rational and real numbers. Underlying theme: Methods of mathematical proofs.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 2: Breaking Unbreakable Ciphers.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Classical Encryption techniques
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Traditional Symmetric-Key Ciphers
1 Information Theory Nathanael Paul Oct. 09, 2002.
1 Methods of Proof Proof techniques in this handout –Direct proof –Division into cases –Proof by contradiction In this handout, the proof techniques will.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
UNIT - 2.  A binary operation on a set combines two elements of the set to produce another element of the set. a*b  G,  a, b  G e.g. +, -, ,  are.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
@Yuan Xue Quick Review.
Modular Arithmetic with Applications to Cryptography
Introduction CS 303 Algorithmic Number Theory and Cryptography
Prelude to Public-Key Cryptography
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann
Elliptic Curves.
RSA Cryptosystem Bits PCs Memory MB ,000 4GB 1,020
B504/I538: Introduction to Cryptography
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Topic 3: Perfect Secrecy
Information-Theoretic Secrecy
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
CMSC 414 Computer and Network Security Lecture 3
Cryptography Lecture 6.
Cryptography II Jagdish S. Gangolly School of Business
Some of this slide set is from Section 2,
ICS 454: Principles of Cryptography
The sum of any two even integers is even.
Classical Cryptography
Classical Ciphers – 2 CSCI284 Spring 2004 GWU
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
El Gamal and Diffie Hellman
Block Ciphers: DES and AES
... DISCRETE random variables X, Y Joint Probability Mass Function y1
Algebraic Structures: Group Theory
Information Security CS 526 Topic 3
Traditional Symmetric-Key Ciphers
One Way Functions Motivation Complexity Theory Review, Motivation
Introduction to Algorithms Second Edition by
Mixed Alphabet Keyword
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Copyright © Cengage Learning. All rights reserved.
THE WELL ORDERING PROPERTY
Symmetric Encryption or conventional / private-key / single-key
Florida State University
2. Perfect Secret Encryption
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

Shannon Secrecy CSCI284/162 Spring 2009 GWU

CS284/Spring09/GWU/Vora/Shannon Secrecy Latin Square A Latin Square of order n is an n  n array where each integer from 1…n occurs exactly once in each row and column 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

Perfect Secrecy: Definition A cryptosystem has perfect secrecy if Pr[x|y] = Pr[x]  xP, yC a posteriori probability = a priori probability posterior = prior 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

general proof for secrecy of a system p(m) = anything p(k) = ? p(m|c) = p(c|m) p(m) / x p(c|x)p(x) = k p(k|eK(m)=c) p(m) / x k p(k|eK(x)=c) p(x) 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Example: one-time pad P = C = Z2n dK=eK(x1, x2, …xn) = (x1+K1, x2+K2, …xn+Kn) mod 2 Show that it provides perfect secrecy if the keys are uniformly distributed 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy one-time pad: proof p(m) = anything p(k) = constant p(m|c) = p(c|m) p(m) / x p(c|x)p(x) = k p(k|eK(m)=c) p(m) / k  x p(k|eK(x)=c) p(x) = p(k) p(m) /  x p(k) p(x) (because only one key per plaintext/ciphertext pair) = p(m) 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

A vulnerability of the one-time pad Exercise 2.6 Suppose that y and y’ are two ciphertext elements in the one-time pad that were obtained by encrypting x and x’ respectively using the same key K. Prove that x + x’ = y + y’ (mod 2) 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Some proofs: Thm. 2.3 Thm 2.3 : Suppose the 26 keys in the shift cipher are used with equal probability 1/26. Then for any plaintext probability distribution, the Shift Cipher has perfect secrecy. P(m) = anything; P(k) = 1/26; P(c) = x P(c|x)P(x) = x P(k|x+k = c)P(x) x P(k = x-c)P(x) = 1/26 P(m|c) = P(c|m)P(m)  26 = P(m) 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Some proofs: Thm. 2.4 Thm 2.4: Suppose (P, C, K, E, D) is a cryptosystem where |K| = |P| = |C|. Then the cryptosystem provides perfect secrecy if and only if every key is used with equal probability 1/|K|, and m P and c C, there is a unique key K such that eK(m) = c 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Thm. 2.4: Proof  Suppose (P, C, K, E, D) is a cryptosystem where |K| = |P| = |C|. Suppose every key is used with equal probability 1/|K|, and m P and c C, there is a unique key K such that eK(m) = c Then the cryptosystem provides perfect secrecy 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy : Proof p(m) = anything p(k) = 1/|K| p(m|c) = p(c|m) p(m) / x p(c|x)p(x) = k p(k|eK(m)=c) p(m) / x k p(k|eK(x)=c) p(x) = 1/|K| p(m) / x 1/|K| p(x) = p(m) 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Thm. 2.4 Proof  Suppose (P, C, K, E, D) is a cryptosystem where |K| = |P| = |C|. Suppose the cryptosystem provides perfect secrecy. Then every key is used with equal probability 1/|K|, and m P and c C, there is a unique key K such that eK(m) = c 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Thm. 2.4 Proof  First show: Suppose (P, C, K, E, D) is a cryptosystem where |K| = |P| = |C|. Suppose the cryptosystem provides perfect secrecy. Then m P and c C, there is a unique key K such that eK(m) = c 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy If K1 and K2 take m to c, K1  K2 If p(m) = 0, then p(m|c) = 0 Consider a distribution for which p(m)  0 Then there is some c’ that m does not go to, under any K (as |K| = |P| = |C| ) Then p(m|c’) = 0  p(m) Hence, m P and c C, there is at most one key K such that eK(m) = c Because |K| = |P| = |C|, there is a unique key taking m to c 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Thm. 2.4 Proof  Now show: Suppose (P, C, K, E, D) is a cryptosystem where |K| = |P| = |C|. Suppose the cryptosystem provides perfect secrecy. Then every key is used with equal probability 1/|K| Straightforward from perfect secrecy formula 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

Product Cryptosystems Composition of two cryptosystems with same plaintext and ciphertext spaces: P = C (P, P, K1, K2, E, D) e (K1, K2) (x) = e K2(e K1(x)) d (K1, K2) (x) = d K1(d K2 (x)) Pr[K1 K2 ] = Pr[K1] Pr[K2] e.g.: Shift  Affine; Shift  Substitution 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

Properties: Product Cryptosystems A commutative cryptosystem is one in which S  M = M  S (S1  S2)  S3 = S1  (S2  S3) for all cryptosystems associative S idempotent if S  S = S (then no point in composing) 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy S  M = ? M the multiplicative cipher with eK(x) = Ka mod m (what property for K?) K chosen equiprobably S the shift cipher, eK(x) = K+a mod m S  M = ? 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy

CS284/Spring09/GWU/Vora/Shannon Secrecy Prob. 2.19 Suppose S1 is the Shift Cipher (with equiprobable keys) and S2 is the Shift Cipher with keys chosen wrt some pdf pK (not necc. equiprobable). Prove that S1  S2 = S1 4/11/2019 CS284/Spring09/GWU/Vora/Shannon Secrecy