Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.

Slides:



Advertisements
Similar presentations
CIS 5371 Cryptography 3b. Pseudorandomness.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Attacks on Digital Signature Algorithm: RSA
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.
Public Encryption: RSA
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Computer Security CS 426 Lecture 3
Introduction to Cryptography
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
CIS 5371 Cryptography Introduction.
Cryptography Lecture 1 Stefan Dziembowski
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
Network Security Section 1: Introduction to security.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
INCS 741: Cryptography Overview and Basic Concepts.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Administrative Details Grade – 80% test, 20% homework 4-5 homework assignments Office hours after lesson Tel
Administrative Details
CAS CS 538 Cryptography.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Symmetric Encryption or conventional / private-key / single-key
2. Perfect Secret Encryption
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.

Administrative Details Grade –exam ( 75% ), homework ( 25% ). Exam on last class. In class exam. No 2 nd chance. Homework submission in pairs. 2-3 “dry’’ assignments. 1-2 “wet” assignments (in MAPLE). Office hours: By e-appointment.

Course Outline Encryption Data integrity Authentication and identification Digital signatures Number theory Randomness and pseudo-randomness Cryptographic protocols Real world security systems Watermarking, digital rights management, etc.

Prerequisites: Linear Algebra Probability Computational Models “Mathematical Maturity”

Bibliography Text Book: Cryptography Theory and Practice, D. Stinson, CRC Press, (should be available at the library) Recommended: - Handbook of Applied Cryptography Menezes, Van Oorschot, Vanstone (free download at ) - Applied Cryptography, B. Schneier

Good Crypto Courses on the Web Hugo Krawczyk course at the Technion. Ron Rivest course at MIT. Dan Boneh course at Stanford. Phil Rogaway Course at UC Davis. Eli Biham course at the Technion. Doug Stinson course at Waterloo.

Encryption Much of Security has little to do with Encryption Encryption deals with secrecy Most real security deals with problems of fraud: Message modifications Almost invariably, Encryption does not live alone without some form of authentication

Definitions Encryption function (& algorithm): E Decryption function (& algorithm): D Encryption key k 1 Decryption key k 2 Message space (usually binary strings) For every message m: D k2 (E k 1 (m)) = m

Communication Model AliceBob 1.Two parties – Alice and Bob 2.Reliable communication line 3.Shared encryption scheme: E, D, k 1, k 2 4.Goal: send a message m confidentially

Threat Model AliceBob 4. Goal: send a message m confidentially Eve

Security Goals Possibilities: No adversary can determine m No adversary can determine any information about m No adversary can determine any meaningful information about m.

Adversarial model Eve attempts to discover information about m Eve knows the algorithms E,D Eve knows the message space Eve has at least partial information about E k1 (m) Eve does not know k 1, k 2

Examples – bad ciphers Shift cipher Conclusion – large key space required Substitution cipher Large key space, still “easy” to break

Substitution cipher Example: plaintext: attack at dawn ciphertext: waaoq wa vwmk Size of key space: 26!= ~ 4 x large enough

Additional definitions Plaintext – the message prior to encryption (“attack at dawn”, “sell MSFT at 57.5”) Ciphertext – the message after encryption (“ יחלעכ חעכןטאככעכ ”,“jhhfoghjklvhgbljhg” ) Symmetric key – encryption scheme where k 1 =k 2 (classical cryptography)

Perfect Cipher Plaintext space – {0,1} n Given a ciphertext C the probability that D k2 (C)=P for any plaintext P is equal to the apriori probability that P is the plaintext. In other words: Pr[plaintext=P|C] = Pr[plaintext=P] Probabilities are over the key space and the plaintext space.

Example – One Time Pad Plaintext space - {0,1} n Key space - {0,1} n The scheme is symmetric, key k is chosen at random E k (P) = C = P  K D k (C) = C  K = P

Pros and Cons Claim: the one time pad is a perfect cipher. Problem: size of key space. Theorem (Shannon): A cipher cannot be perfect if its key space is less than the size of its message space. Why??? Argue in class.

Computational Power Time Hardware Storage Theoretical – polynomial time Practical – 2 64 is feasible, 2 80 is infeasible

Attack Models Eavesdropping Known plaintext Chosen plaintext Chosen ciphertext Adaptive chosen text attacks Physical access “Physical” modification of messages