CIS 5371 Cryptography 2. Perfect Secret Encryption

Slides:



Advertisements
Similar presentations
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Advertisements

CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
CIS 5371 Cryptography 3b. Pseudorandomness.
1 CIS 5371 Cryptography 4. Collision Resistant Hash Functions B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Ref. Cryptography: theory and practice Douglas R. Stinson
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Computer Security CS 426 Lecture 3
Codes, Ciphers, and Cryptography-RSA Encryption
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
1 Information Theory Nathanael Paul Oct. 09, 2002.
1 CIS 5371 Cryptography 4. Message Authentication Codes B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
Lectures so far: Today’s lecture: Discrete probability Proving things
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
@Yuan Xue Quick Review.
B504/I538: Introduction to Cryptography
Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann
Secrecy of (fixed-length) stream ciphers
Topic 11: Authenticated Encryption + CCA-Security
Cryptography Lecture 3.
B504/I538: Introduction to Cryptography
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
Cryptography Lecture 4.
B504/I538: Introduction to Cryptography
Topic 30: El-Gamal Encryption
Topic 3: Perfect Secrecy
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Information-Theoretic Secrecy
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
CMSC 414 Computer and Network Security Lecture 3
Cryptography Lecture 6.
Cryptography Lecture 10.
Topic 7: Pseudorandom Functions and CPA-Security
B504/I538: Introduction to Cryptography
Cryptography Lecture 7.
B504/I538: Introduction to Cryptography
Symmetric-Key Encryption
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptography Lecture 4.
Cryptography Lecture 5.
Cryptography Lecture 8.
Cryptography Lecture 11.
Cryptography Lecture 12.
Topic 13: Message Authentication Code
Shannon Secrecy CSCI284/162 Spring 2009 GWU.
Cryptography Lecture 3.
Information Security CS 526 Topic 3
Cryptography Lecture 7.
Cryptography Lecture 3.
Cryptography Lecture 9.
Cryptography Lecture 6.
2. Perfect Secret Encryption
How to Use Charm Crypto Lib
Presentation transcript:

CIS 5371 Cryptography 2. Perfect Secret Encryption Based on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography

Encryption Plaintext Ciphertext Encryption Decryption encryption key decryption key Encryption Plaintext Ciphertext Decryption

Encryption schemes (ciphers)   x

Encryption schemes Definition An encryption scheme (Gen,Enc,Dec) over message space M is perfectly secret if for every probability distribution over M, every message mM, and every ciphertext cC for which Pr[C = c]  0: Pr[M = m | C = c] = Pr[M = m] Convention: We consider only probability distributions over M, C that assign non-zero probabilities to all mM and cC.

Encryption schemes Lemma 1 An encryption scheme (Gen,Enc,Dec) over message space M is perfectly secret if and only if for every probability distribution over M, every message mM, and every ciphertext cC: Pr[C = c | M = m] = Pr[C = c]

Encryption schemes  

Encryption schemes An equivalent definition for perfect secrecy  

Encryption schemes    

Encryption schemes  

Shannon’s Theorem Theorem Let (Gen,Enc,Dec) be an encryption scheme over a message space M for which |M|= |K|=|C|. The scheme is perfectly secret if and only if: Every key kK is chosen with equal probability 1/|K| by algorithm Gen. For every mM and every cC there is a unique key kK such that Enck(m) outputs c

Shannon’s Theorem  

Shannon’s Theorem Proof. We have Pr[C=c|M=m]=Pr[K=k] where c=mk, for any c,m, since the key k. Since the keys are chosen uniformly at random: Pr[C=c|M=m]=1/|K| for any mM. It follows that: Pr[C=c|M=m1] =Pr[C=c|M=m2], for any m1,m2 M

Encryption algorithms: one-time pad  

One-time pad Theorem The one time pad encryption scheme is perfectly secret.

One-time pad Proof (use Lemma 2) For any c C and m1, m2  M we have: Pr[C=c|M=m1]=Pr[k=k1]=1/|K| Pr[C=c|M=m2]=Pr[k=k2]=1/|K| It follows that: Pr[C=c|M=m1]=Pr[C=c|M=m2]

Limitations to perfect secrecy Theorem Let (Gen,Enc,Dec) be a perfectly secret encryption scheme over message space M, and let K be the key space as determined by Gen. Then |K|  |M| .