Cryptography Lecture 12.

Slides:



Advertisements
Similar presentations
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Advertisements

Let X 1, X 2,..., X n be a set of independent random variables having a common distribution, and let E[ X i ] = . then, with probability 1 Strong law.
Occupancy Problems m balls being randomly assigned to one of n bins. (Independently and uniformly) The questions: - what is the maximum number of balls.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
CIS 5371 Cryptography 3b. Pseudorandomness.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 12 Lecturer: Moni Naor.
1. Probability of Equally Likely Outcomes 2. Complement Rule 1.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
This is a discrete distribution. Poisson is French for fish… It was named due to one of its uses. For example, if a fish tank had 260L of water and 13.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
CS555Spring 2012/Topic 81 Cryptography CS 555 Topic 8: Pseudorandom Functions and CPA Security.
1 4.1 Hash Functions and Data Integrity A cryptographic hash function can provide assurance of data integrity. ex: Bob can verify if y = h K (x) h is a.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Probabilistic analysis
B504/I538: Introduction to Cryptography
Probability – part 1 Prof. Carla Gomes Rosen 1 1.
Topic 26: Discrete LOG Applications
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Security of Message Digests
CHAPTER 2 RANDOM VARIABLES.
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann
Introduction to Algorithms 6.046J/18.401J
Topic 14: Random Oracle Model, Hashing Applications
Cryptography Lecture 9.
Random Testing.
Topic 11: Authenticated Encryption + CCA-Security
Cryptography Lecture 3.
Cryptographic Hash Functions Part I
Cryptography Lecture 13.
B504/I538: Introduction to Cryptography
Cryptography Lecture 12.
B504/I538: Introduction to Cryptography
Topic 30: El-Gamal Encryption
Randomized Algorithms CS648
Cryptography Lecture 19.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Cryptography Lecture 6.
Fuzzy Identity Based Encryption
Topic 7: Pseudorandom Functions and CPA-Security
B504/I538: Introduction to Cryptography
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
Cryptography Lecture 7.
B504/I538: Introduction to Cryptography
Cryptography Lecture 14.
Consider the following problem
Chapter 5: Probabilistic Analysis and Randomized Algorithms
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptographic Hash Functions Part I
Cryptography Lecture 8.
Cryptography Lecture 14.
Cryptography Lecture 9.
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Cryptography Lecture 6.
Cryptography Lecture 7.
Cryptography Lecture 14.
Cryptography Lecture 13.
Binomial Distribution
Chapter 5: Probabilistic Analysis and Randomized Algorithms
Cryptography Lecture 6.
Cryptography Lecture 13.
Cryptography Lecture 15.
Cryptography Lecture 25.
Blockchains Lecture 4.
Chapter 11 Probability.
Presentation transcript:

Cryptography Lecture 12

Problems 1 Let t be a fixed n-bit value. If we randomly select an n-bit value x. What is the probability of x = t? 2-n

Problems 1 Union bound: Pr[E1 V E2] ≤ Pr[E1] + Pr[E2] E1 V E2: disjunction (E1 or E2 occurs) What is the probability that a random n-bit value y is equal to any of q n-bit different values? = Pr[y = first value] + Pr[ y = second value] + … Pr[y = q-th value] = q/2n

Problems 1 Union bound: Pr[E1 V E2] ≤ Pr[E1] + Pr[E2] E1 V E2: disjunction (E1 or E2 occurs) What is the probability that a random n-bit value y is equal to any of q n-bit different values? What if these q values are randomly selected? Simple… ≤q/2n Remember when this is used? (Our first CPA secure scheme using PRF! Page 83)

Problem 2 (Birthday problem) If q people are in a classroom, what is the probability that two of them have the same birthday? (Assume birthdays are uniformly and independently distributed among the 365 days.) Equivalently, if we choose q elements y1, y2, …, yq uniformly form a set of N, what is the probability there exist distinct i, j with yi=yi? This event is called a collision. Let’s write coll(q, N) to denote the probability of this event.

Problem 2 It can be proven (book pp. 543 and 544) q(q-1)/4N ≤ coll(q, N) ≤ q2/2N Conclusion is important Proofs are standard (although not required by the exam, you are encouraged to go over them. It is a good exercise, indeed.) Very tight bound, mathematically beautiful Can be understood in two ways When N is small, coll is high! (so that you can attack!) When N is large, coll is negligible! (so that you cannot attack)

The remaining lecture Finish authenticated encryption and secure sessions