Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.

Slides:



Advertisements
Similar presentations
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 1-7: Short Recap.
Advertisements

SECURITY AND VERIFICATION Lecture 4: Cryptography proofs in context Tamara Rezk INDES TEAM, INRIA January 24 th, 2012.
Online Cryptography Course Dan Boneh
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lectures 1-6: Short Recap.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Ref. Cryptography: theory and practice Douglas R. Stinson
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Information Theory and Security pt. 2. Lecture Motivation Previous lecture talked about a way to measure “information”. In this lecture, our objective.
Information Theory and Security. Lecture Motivation Up to this point we have seen: –Classical Crypto –Symmetric Crypto –Asymmetric Crypto These systems.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CryptographyPerfect secrecySlide 1 Today What does it mean for a cipher to be: –Computational secure? Unconditionally secure? Perfect secrecy –Conditional.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
CS526Topic 3: One-time Pad and Perfect Secrecy 1 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream.
Cryptography Lecture 8 Stefan Dziembowski
CIS 5371 Cryptography Introduction.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Cryptography Lecture 10 Arpita Patra. Quick Recall and Today’s Roadmap >> CPA & CPA-mult security >> Equivalence of CPA and CPA-mult security >> El Gamal.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
Lectures so far: Today’s lecture: Discrete probability Proving things
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Cryptography Lecture 4 Arpita Patra. Recall o Various Definitions and their equivalence (Shannon’s Theorem) o Inherent Drawbacks o Cannot afford perfect.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Dan Boneh Introduction Discrete Probability (crash course, cont.) Online Cryptography Course Dan Boneh See also:
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Cryptography Lecture 6 Arpita Patra. Quick Recall and Today’s Roadmap >> MAC for fixed-length messages >> Domain Extension for MAC >> Authenticated Encryption:
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
B504/I538: Introduction to Cryptography
Cryptography Lecture 3.
B504/I538: Introduction to Cryptography
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
Cryptography Lecture 4.
Topic 5: Constructing Secure Encryption Schemes
Cryptography Lecture 5.
Topic 3: Perfect Secrecy
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Cryptography Lecture 2 Arpita Patra © Arpita Patra.
CMSC 414 Computer and Network Security Lecture 3
Cryptography Lecture 6.
B504/I538: Introduction to Cryptography
Cryptography Lecture 4 Arpita Patra © Arpita Patra.
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Cryptography Lecture 4 Arpita Patra © Arpita Patra.
Cryptography Lecture 4.
Cryptography Lecture 5.
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Cryptography Lecture 7.
Cryptography Lecture 3.
2. Perfect Secret Encryption
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy

2 Themes of Crypto  Formal Definitions  Probability  Quantifiers Today:  Formal definition of security – prefect secrecy  Simple & efficient perfectly secure encryption scheme.  Limitations of perfect secrecy

3 Probability – Quick Review Notations:Distribution D - a set and probability function on the set Supp(D) = set of elements x s.t. Pr[x] > 0 x  R D : x distributed according to D x  R S : x distributed according to uniform dist on S U n : uniform distribution on {0,1} n Lemma: Let D dist. s.t. 8 x, Pr D [x] · . Let D’ be independent distribution. Then Pr[ D=D’] · . D ´ D’ : D and D’ are identically distributed.

4 Defining Security for Encryptions. Rules of the game:  Encryption algorithm: E  Decryption algorithm: D  Secret key: k Notations:  n – length of key  m – length of plaintext  m’ – length of ciphertext  p – plaintext  c – ciphertext SR k  R {0,1} n k k c=E k (p) p=D k (c)

5 (Perfect) Semantic Security For every:  Distribution on plaintexts P over {0,1} m  Function f:{0,1} m  {0,1} * Define:  = prob. of most likely value in f(P) a-priori chance of guessing f(p) for unknown plaintext p  R P Then for every adversary Adv, Pr [ Adv(E k (p)) = f(p) ] ·  k  R {0,1} n, p  R P I.e., posteriori prob of learning f(p) = a-priori prob. of learning f(p) (probabilistic, w/ unlimited computation)

6 Semantic Security – Game ViewS P, f pR PpR P k  R {0,1} n c=E k (p) y Adv successful if y=f(p) (E,D) is semantically secure if Pr [ Adv successful ] ·  Exercise: 1. Show that Caesar-cipher is not semantically secure. 2. Show that substitution-cipher is not semantically secure.

7 A Different Definition - IndistinguishabilityS P, f pR PpR P k  R {0,1} n c=E k (p) y Adv successful if y=f(p) (E,D) is semantically secure if Pr [ Adv successful ] ·  S p 1,p 2 2{0,1} m k  R {0,1} n i  R {1,2} c=E k (p i ) j2{1,2} Adv successful if j=i (E,D) is indistinguishable if Pr [ Adv successful ] · ½ Theorem: (E,D) is semantically secure, (E,D) indistinguishable

8 A Perfectly Secure Encryption Def (XOR operation): For a2{0,1}, a©0 = a, a © 1 = a c For x,y2{0,1} n, (x© y) i = x i © y i The one-time pad scheme:  Key length = message length (n)  Encryption: E k (p) = p©k  Decryption: D k (c) = c©k Known facts:  a©a = 0  XOR = addition mod 2  XOR commutative: a©b = b©a  XOR associative: a©(b©c) = (a©b)© c D k (E k (p)) = (p©k)©k = p©(k©k) = p©0 n = p p = p 1 p 2 p 3 p n k = k 1 k 2 k 3 k n c = c 1 c 2 c 3 c n ©

9 OTP Has Perfect Secrecy Def: (E,D) is Shannon secure if 9 dist. C s.t. 8 p2{0,1} m E U (p) ~ C. n The one-time pad scheme:  Key length = message length (n)  Encryption: E k (p) = p©k  Decryption: D k (c) = c©k p = p 1 p 2 p 3 p n k = k 1 k 2 k 3 k n c = c 1 c 2 c 3 c n © Thm: OTP is Shannon secure. Proof:We’ll show that 8 p, E (p) ~ U n UnUn I.e., 8 p, 8 c Pr k [ p©k = c ] = 2 -n I.e., 8 p, 8 c Pr k [ k = p©c ] = 2 -n Exactly one k among 2 n possible, s.t. k = p©c.

10 Recap Saw 3 equivalent defs for perfectly secure encryption:  Semantic security – matches intuition, applications  Indistinguishability, perfect secrecy – easier to work with Saw that a simple scheme (one-time pad) is perfectly secure. Is this the end of the course? No - Normally we want encryption to use one key for many messages. As a minimum we want key to be shorter than message. Is there a perfectly secure enc. with key shorter than message?

11 No. perfectly secure scheme (E,D) with |k|<|p| Before seeing proof, consider the one-time-pad. Natural extension to longer messages – use pad twice. k2{0,1} n, p2{0,1} 2n E k (p) = ( k©p 1..n, k©p n+1..2n ) Is this secure?

12 Statistical Security Perhaps perfect secrecy is too much. For example, no harm if Adv learns something with probability. (E,D) is semantically secure if S P, f pR PpR P k  R {0,1} n c=E k (p) y Adv successful if y=f(p) Pr [ Adv successful ] ·  S p 1,p 2 2{0,1} m k  R {0,1} n i  R {1,2} c=E k (p i ) j2{1,2} Adv successful if j=i (E,D) is indistinguishable if Pr [ Adv successful ] · ½ Definitions are still equivalent, but do they help us get the key size down?

13 Statistical SecurityS p 1,p 2 2{0,1} m k  R {0,1} n i  R {1,2} c=E k (p i ) j2{1,2} Adv successful if j=i (E,D) is indistinguishable if Pr [ Adv successful ] · ½   Focus on indist. definition. Previous implication: 8 p 1,p 2 E U [p 1 ] ~ E U [p 2 ] nn Lemma 1: If (E,D)  -indist. then 8 p 1,p 2  (E U [p 1 ], E U [p 2 ]) <  n n Def: The statistical distance of X and Y is defined as:  X,Y) = ½  w | Pr X [w] – Pr Y [w] | (E,D) with |k|<|p| that is 0.1-indistinguishable. Proof uses the probabilistic method.