2. Perfect Secret Encryption

Slides:



Advertisements
Similar presentations
Ref. Cryptography: theory and practice Douglas R. Stinson
Advertisements

CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Information Theory and Security pt. 2. Lecture Motivation Previous lecture talked about a way to measure “information”. In this lecture, our objective.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Computer Security CS 426 Lecture 3
Codes, Ciphers, and Cryptography-RSA Encryption
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
CS526Topic 3: One-time Pad and Perfect Secrecy 1 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
1 Information Theory Nathanael Paul Oct. 09, 2002.
Lectures so far: Today’s lecture: Discrete probability Proving things
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Introduction to Cryptography
B504/I538: Introduction to Cryptography
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann
Group theory exercise.
Secrecy of (fixed-length) stream ciphers
SYMMETRIC KEY ALGORITHMS
Cryptography Lecture 9.
Topic 11: Authenticated Encryption + CCA-Security
Cryptography Lecture 3.
Cryptography Lecture 12.
B504/I538: Introduction to Cryptography
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
Cryptography Lecture 4.
B504/I538: Introduction to Cryptography
Cryptography Lecture 5.
Topic 3: Perfect Secrecy
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Information-Theoretic Secrecy
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
CMSC 414 Computer and Network Security Lecture 3
Cryptography Lecture 6.
Cryptography Lecture 10.
Topic 7: Pseudorandom Functions and CPA-Security
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
Cryptography Lecture 7.
Cryptography Lecture 7 Arpita Patra © Arpita Patra.
B504/I538: Introduction to Cryptography
Symmetric-Key Encryption
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
SYMMETRIC KEY ALGORITHMS
Cryptography Lecture 4.
Cryptography Lecture 5.
Cryptography Lecture 11.
Cryptography Lecture 9.
Cryptography Lecture 12.
Shannon Secrecy CSCI284/162 Spring 2009 GWU.
Cryptography Lecture 3.
Information Security CS 526 Topic 3
Cryptography Lecture 7.
Cryptography Lecture 3.
Cryptography Lecture 9.
Cryptography Lecture 11.
Cryptography Lecture 6.
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
How to Use Charm Crypto Lib
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

2. Perfect Secret Encryption CIS 5371 Cryptography 2. Perfect Secret Encryption

Encryption Plaintext Ciphertext Encryption Decryption encryption key decryption key Encryption Plaintext Ciphertext Decryption

Encryption schemes  

Encryption schemes Definition An encryption scheme (Gen,Enc,Dec) over message space M is perfectly secret if for every probability distribution over M, every message mM, and every ciphertext cC for which Pr[C = c]  0: Pr[M = m | C = c] = Pr[M = m] Convention: We consider only probability distributions over M, C that assign non-zero probabilities to all mM and cC.

Encryption schemes Lemma 1 An encryption scheme (Gen,Enc,Dec) over message space M is perfectly secret if and only if for every probability distribution over M, every message mM, and every ciphertext cC: Pr[C = c | M = m] = Pr[C = c]

Encryption schemes  

Encryption schemes An equivalent definition for perfect secrecy

Encryption schemes  

Shannon’s Theorem Theorem Let (Gen,Enc,Dec) be an encryption scheme over a message space M for which |M|= |K|=|C|. The scheme is perfectly secret if and only if: Every key kK is chosen with equal probability 1/|K| by algorithm Gen. For every mM and every cC there is a unique key kK such that Enck(m) outputs c

Encryption algorithms  

Encryption schemes Theorem The one time pad encryption scheme is perfectly secret.

Limitations to perfect secrecy Theorem Let (Gen,Enc,Dec) be a perfectly secret encryption scheme over message space M, and let K be the key space as determined by Gen. Then |K|  |M| .