The Power of Randomness in Computation David Zuckerman University of Texas at Austin.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

RSA.
Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Foundations of Cryptography Lecture 3 Lecturer: Moni Naor.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
Extracting Randomness David Zuckerman University of Texas at Austin.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Copyright © 2010, 2007, 2004 Pearson Education, Inc. Chapter 11 Understanding Randomness.
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
Generating Random Numbers
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
22C:19 Discrete Structures Integers and Modular Arithmetic
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 11: Birthday Paradoxes.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
Pseudorandom Number Generators
CRYPTOGRAPHY WHAT IS IT GOOD FOR? Andrej Bogdanov Chinese University of Hong Kong CMSC 5719 | 6 Feb 2012.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Prof. Bart Selman Module Probability --- Part e)
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
The Power of Randomness in Computation 呂及人中研院資訊所.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Introduction to Public Key Cryptography
The RSA Algorithm Rocky K. C. Chang, March
1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.
MATH 224 – Discrete Mathematics
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
RSA Ramki Thurimella.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Pseudorandomness Emanuele Viola Columbia University April 2008.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
MA/CSSE 473 Day 11 Primality testing summary Data Encryption RSA.
1-1 Copyright © 2015, 2010, 2007 Pearson Education, Inc. Chapter 10, Slide 1 Chapter 10 Understanding Randomness.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Introduction to Quantum Key Distribution
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
When is Randomness Extraction Possible? David Zuckerman University of Texas at Austin.
Understanding Randomness.  Many phenomena in the world are random: ◦ Nobody can guess the outcome before it happens. ◦ When we want things to be fair,
CHAPTER 5 Simulation Modeling. Introduction In many situations a modeler is unable to construct an analytic (symbolic) model adequately explaining the.
Pseudo-random generators Talk for Amnon ’ s seminar.
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Public Key Cryptography
CS154, Lecture 18:.
Pseudorandomness when the odds are against you
Monte Carlo Approximations – Introduction
Practical Aspects of Modern Cryptography
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
Presentation transcript:

The Power of Randomness in Computation David Zuckerman University of Texas at Austin

Outline Power of randomness: –Randomized algorithms –Monte Carlo simulations –Cryptography (secure computation) Is randomness necessary? –Pseudorandom generators –Randomness extractors

Random Sampling: Flipping a Coin Flip a fair coin 1000 times. # heads is 500 ± 35, with 95% certainty. n coins gives n/2 ± √n. Converges to fraction 1/2 quickly.

Cooking Sautéing onion: Expect half time on each side. Random sautéing works well.

Polling CNN/ORC Poll, June Margin of error = 3.5% 95% confidence Sample size = 906 Huge population Sample size independent of population

Random Sampling in Computer Science Sophisticated random sampling used to approximate various quantities. –# solutions to an equation –Volume of a region –Integrals Load balancing

Another Use of Randomness: Equality Testing Does 12 2,000, =143 1,000, ? Natural algorithm: multiply it out and add. Inefficient: need to store 2,000,000 digit numbers. Better way?

Another Use of Randomness: Equality Testing Does 12 2,000, =143 1,000, ? No: even+odd≠odd+odd. What if both sides even (or both sides odd)? Odd/even: remainder mod 2.

Randomized Equality Testing Pick random number r of appropriate size (in example, < 100,000,000). Compute remainder mod r. Can do efficiently: only keep track of remainder mod r. Example: 7 3 mod 47: 7 3 =7 2. 7=49. 7=2. 7=14 mod 47.

Randomized Equality Testing If =, then remainder mod r is =. If ≠, then remainder mod r is ≠, with probability >.9. Can improve error probability by repeating: –For example, start with error.1. –Repeat 10 times. –Error becomes =

Randomized Algorithms Examples: –Randomized equality testing –Approximation algorithms –Optimization algorithms –Many more Often much faster and/or simpler than known deterministic counterparts.

Monte Carlo Simulations Many simulations done on computer: –Economy –Weather –Complex interaction of molecules –Population genetics Often have random components –Can model actual randomness or complex phenomena.

Secure Communication Alice and Bob have no shared secret key. Eavesdropper can hear (see) everything communicated. Is private communication possible? laptop user Amazon.com

Security impossible (false proof) Eavesdropper has same information about Alice’s messages as Bob. Whatever Bob can compute from Alice’s messages, so can Eavesdropper.

Security possible! Flaw in proof: although Eavesdropper has same information, computation will take too long. Bob can compute decryption much faster. How can task be easier for Bob?

Key tool: 1-way function Easy to compute, hard to invert. Toy example: assume no computers, but large phone book. f(page #)=1st 5 phone numbers on page. –Given page #, easy to find phone numbers. –Given phone numbers, hard to find page #.

Key tool: 1-way function Easy to compute, hard to invert. Example: multiplication of 2 primes easy. e.g =12,319 Factoring much harder: e.g. given 12,319, find its factors. f(p,q) = p. q is a 1-way function.

Public Key Cryptography Fast decryption requires knowing p and q. Bob chooses 2 large primes p,q randomly. Sets N=p. q. p,q secret N Enc(N,message)

Power of Randomness Randomized algorithms –Random sampling and approximation algorithms –Randomized equality testing –Many others Monte Carlo simulations Cryptography

Randomness wonderful, but … Computers typically don’t have access to truly random numbers. What to do? What is a random number? –Random integer between 1 and 1000: –Probability of each = 1/1000.

Is Randomness Necessary? Essential for cryptography: if secret key not random, Eavesdropper could learn it. Unclear for algorithms. –Example: perhaps a clever deterministic algorithm for equality testing. Major open question in field: does every efficient randomized algorithm have an efficient deterministic counterpart?

What is minimal randomness requirement? Can we eliminate randomness completely? If not: –Can we minimize quantity of randomness? –Can we minimize quality of randomness? What does this mean?

What is minimal randomness requirement? Can we eliminate randomness completely? If not: –Can we minimize quantity of randomness? Pseudorandom generator –Can we minimize quality of randomness? Randomness extractor

Pseudorandom Numbers Computers rely on pseudorandom generators: PRG short random string long “random-enough” string What does “random enough” mean?

Classical Approach to PRGs PRG good if passes certain ad hoc tests. –Example: frequency of each digit ≈ 1/10. But: Failures of PRGs reported: 95% confidence intervals ( ) ( ) ( ) PRG1 PRG2 PRG3

Modern Approach to PRGs [Blum-Micali, Yao] Alg random pseudorandom ≈ same behavior Require PRG to “fool” all efficient algorithms.

Modern Approach to PRGs Can construct such PRGs if assume certain functions hard to compute [Nisan-Wigderson] What if no assumption? Unsolved and very difficult: related to $1,000,000 “NP = P?” question. Can construct PRGs which fool restricted classes of algorithms, without assumptions.

Quality: Weakly Random Sources What if only source of randomness is defective? Weakly random number between 1 and 1000: each has probability ≤ 1/100. Can’t use weakly random sources directly.

Goal Ext very long weakly random long almost random Problem: impossible.

Solution: Extractor [Nisan-Zuckerman] Ext very long weakly random long almost random short truly random

Power of Extractors Sometimes can eliminate true randomness by cycling over all possibilities. Useful even when no weakly random source apparently present. Mathematical reason for power: extractor constructions beat “eigenvalue bound.” Caveat: strong in theory but practical variants weaker.

Extractors in Cryptography Alice and Bob know N = secret 100 digit # Eavesdropper knows 40 digits of N. Alice and Bob don’t know which 40 digits. Can they obtain a shorter secret unknown to Eve?

Extractors in Cryptography [Bennett-Brassard-Roberts, Lu, Vadhan] Eve knows 40 digits of N = 100 digits. To Eve, N is weakly random: –Each number has probability ≤ Alice and Bob can use extractors to obtain a 50 digit secret number, which appears almost random to Eve.

Extractor-Based PRGs for Random Sampling [Zuckerman] Nearly optimal number of random bits. Downside: need more samples for same error. PRG n digits per sample 1.01n digits

Other Applications of Extractors PRGs for Space-Bounded Computation [Nisan-Z] Highly-connected networks [Wigderson-Z] Coding theory [Ta-Shma-Z] Hardness of approximation [Z, Mossel-Umans] Efficient deterministic sorting [Pippenger] Time-storage tradeoffs [Sipser] Implicit data structures [Fiat-Naor, Z]

Conclusions Randomness extremely useful in CS: –Algorithms, Monte Carlo sims, cryptography. Don’t need a lot of true randomness: –Short truly random string: PRG. –Long weakly random string: extractor. Extractors give specialized PRGs and apply to seemingly unrelated areas.