Security Definitions in Computational Cryptography

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
CS 395T Formal Models of Cryptography: Symmetric Encryption.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
7. Asymmetric encryption-
CS 395T Computational Soundness of Formal Models.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
1 How to securely outsource cryptographic computations Susan Hohenberger and Anna Lysyanskaya TCC2005.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Slide 1 Vitaly Shmatikov CS 380S Semantic Security.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
0x1A Great Papers in Computer Security
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
8. Data Integrity Techniques
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital signature in automatic analyses for confidentiality against active adversaries Ilja Tšahhirov, Peeter Laud.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
Cryptography Lecture 8 Stefan Dziembowski
CIS 5371 Cryptography Introduction.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
1 Public-Key Cryptography and Message Authentication.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
IND-CPA and IND-CCA Concepts Summary  Basic Encryption Security Definition: IND-CPA  Strong Encryption Security Definition: IND-CCA  IND-CPA, IND-CCA.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Digital Signatures, Message Digest and Authentication Week-9.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
Intro to Cryptography Lesson Introduction
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
Tae-Joon Kim Jong yun Jun
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Fall 2006CS 395: Computer Security1 Key Management.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
CS555Spring 2012/Topic 151 Cryptography CS 555 Topic 15: HMAC, Combining Encryption & Authentication.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Homework #1 J. H. Wang Oct. 9, 2012.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Topic 11: Authenticated Encryption + CCA-Security
Presentation transcript:

Security Definitions in Computational Cryptography 18739A: Foundations of Security and Privacy Security Definitions in Computational Cryptography Anupam Datta CMU Fall 2009

Cryptographic Concepts Signature scheme Symmetric encryption scheme

verify(m,sign(m,sk(A)), pk(A)) = ok Signature Scheme Key generation algorithm Input: security parameter n Output: a private signing & public verification key pair Algorithm to sign data Algorithm to verify signature Correctness: Message signed with a signing key verifies with the corresponding verification key verify(m,sign(m,sk(A)), pk(A)) = ok Symbolic Security: A signature cannot be produced without access to the private signing key

UF-CMA Security C A mi sign(mi, sk(C)) sign(m, sk(C)) UF-CMA: Unforgeability of signatures under chosen message attacks. Attacker makes polynomial number of queries in the first stage. The security parameter determines the length of keys, messages and running times of honest parties and the attacker; everything is typically polynomially bounded in the security paramter. UF-CMA security:  PPT attackers A  negligible function f  n0  security parameters n ≥ n0 Prob [m ≠mi | A plays by the rules] <= f(n)

Symmetric Encryption Scheme Key generation algorithm Input: security parameter n Output: a key that is used for encryption and decryption Algorithm to encrypt a message Algorithm to decrypt a ciphertext Correctness: Decrypting a ciphertext obtained by encrypting message m with the corresponding key k returns m dec(enc(m,k),k) = m Computational Security: Ciphertext reveals no information about underlying plaintext

What is a secure encryption scheme? List of possible properties Given a list of message, ciphertext pairs, it should not be possible to recover the key Given ciphertext, it should not be possible recover plaintext Given ciphertext, it should not be possible to recover 1st bit of plaintext All of the above, but what else? Given ciphertext, adversary should have no information about underlying plaintext (not true because of apriori information)

IND-EAV security definition (eavesdropping attacks) k, b m0, m1 enc(k, mb) C A IND-CCA1: Indistinguishability under chosen ciphertext attacks. Attacker makes polynomial number of queries in the first stage. d IND-EAV security:  PPT attackers A  negligible function f  n0  security parameters n ≥ n0 Prob [d = b | A plays by the rules] <= ½ + f(n)

Example General sends an encrypted message where the plaintext is either “attack” or “don’t attack”. Adversary should not be able to figure out what the plaintext is although she knows that it is one of these two values.

IND-CPA security definition (chosen-plaintext attacks) mi k, b enc(k, mi) m0, m1 enc(k, mb) C A mi enc(k, mi) IND-CCA1: Indistinguishability under chosen ciphertext attacks. Attacker makes polynomial number of queries in the first stage. d IND-CPA security:  PPT attackers A  negligible function f  n0  security parameters n ≥ n0 Prob [d = b | A plays by the rules] <= ½ + f(n)

Example US Navy cryptanalysts received a ciphertext containing the word “AF” that they believed corresponded to “Midway island” (May, 1942) Concluded that Japan was planning to attack Midway island, but could not convince top brass Sent out a message saying Midway island was low on water supply Japanese intercepted this message and sent out a message saying “AF” was running low on water supply

IND-CCA secure encryption (chosen-ciphertext attacks) mi or ci k, b enc(k, mi) or dec(k,ci) m0, m1 enc(k, mb) C A cannot submit enc(k,mb) to the decryption oracle mi or ci A enc(k, mi) or dec(k,ci) IND-CCA: Indistinguishability under chosen ciphertext attacks. Attacker makes polynomial number of queries in the first stage and third stages. d IND-CCA security:  PPT attackers A  negligible function f  n0  security parameters n ≥ n0 Prob [d = b | A plays by the rules] <= ½ + f(n)

Example (public-key version) Network protocols Q1 and Q2 QI C B: enc(pk(B), secret, Q1) Q2 A B: enc(pk(B),nonce, Q2) B A: nonce Adversary A has access to B’s decryption oracle, but should still not be able to learn additional information about C’s secret (e.g., cannot tell whether it is “attack” or “don’t attack”)

Questions?