Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
Advertisements

ElGamal Security Public key encryption from Diffie-Hellman
Dan Boneh Using block ciphers Modes of operation: one time key Online Cryptography Course Dan Boneh example: encrypted , new key for every message.
Trusted 3rd parties Basic key exchange
Online Cryptography Course Dan Boneh
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
New Results on PA/CCA Encryption Carmine Ventre and Ivan Visconti Università di Salerno.
Cryptography: Review Day David Brumley Carnegie Mellon University.
1 PRPs and PRFs CS255: Winter Abstract ciphers: PRPs and PRFs, 2.Security models for encryption, 3.Analysis of CBC and counter mode Dan Boneh, Stanford.
Dan Boneh Authenticated Encryption Active attacks on CPA-secure encryption Online Cryptography Course Dan Boneh.
Authenticated Encryption and Cryptographic Network Protocols David Brumley Carnegie Mellon University.
Encryption Public-Key, Identity-Based, Attribute-Based.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
1 Brief PRP-PRF Recap CS255 Winter ‘06. 2 PRPs and PRFs PRF: F: K  X  Y such that: exists “efficient” algorithm to eval. F(k,x) PRP: E: K  X  X such.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Identity Based Encryption
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
Cryptography Overview CS155. Cryptography Is A tremendous tool The basis for many security mechanisms Is not The solution to all security problems Reliable.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Chosen ciphertext attacks Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Case study: TLS Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
8. Data Integrity Techniques
Cryptography Lecture 8 Stefan Dziembowski
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Dan Boneh Using block ciphers Modes of operation: many time key (CTR) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Attacks on OTP and stream ciphers
Dan Boneh Public Key Encryption from trapdoor permutations PKCS 1 Online Cryptography Course Dan Boneh.
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Dan Boneh Public key encryption from Diffie-Hellman The ElGamal Public-key System Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Odds and ends Tweakable encryption
Cryptography: Review Day David Brumley Carnegie Mellon University.
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
Tae-Joon Kim Jong yun Jun
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Online Cryptography Course Dan Boneh
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
Dan Boneh Authenticated Encryption CBC paddings attacks Online Cryptography Course Dan Boneh.
Dan Boneh Authenticated Encryption Constructions from ciphers and MACs Online Cryptography Course Dan Boneh.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Using block ciphers Review: PRPs and PRFs
B504/I538: Introduction to Cryptography
PRPs and PRFs CS255: Winter 2017
Topic 11: Authenticated Encryption + CCA-Security
Topic 30: El-Gamal Encryption
Introduction to Symmetric-key and Public-key Cryptography
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Presentation transcript:

Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh

Dan Boneh Public key encryption E E D D AliceBob pk sk mccm Bob: generates (PK, SK) and gives PK to Alice

Dan Boneh Applications Session setup (for now, only eavesdropping security) Non-interactive applications: (e.g. ) Bob sends to Alice encrypted using pk alice Note: Bob needs pk alice (public key management) Generate (pk, sk) Alice choose random x (e.g. 48 bytes) choose random x (e.g. 48 bytes) Bob pk E(pk, x) x

Dan Boneh Public key encryption Def: a public-key encryption system is a triple of algs. (G, E, D) G(): randomized alg. outputs a key pair (pk, sk) E(pk, m): randomized alg. that takes m ∈ M and outputs c ∈ C D(sk,c): det. alg. that takes c ∈ C and outputs m ∈ M or ⊥ Consistency: ∀ (pk, sk) output by G : ∀ m ∈ M: D(sk, E(pk, m) ) = m

Dan Boneh Security: eavesdropping For b=0,1 define experiments EXP(0) and EXP(1) as: Def: E = (G,E,D) is sem. secure (a.k.a IND-CPA) if for all efficient A: Adv SS [A, E ] = | Pr[EXP(0)=1] – Pr[EXP(1)=1] | < negligible Chal. b Adv. A (pk,sk)  G() m 0, m 1  M : |m 0 | = |m 1 | c  E(pk, m b ) b’  {0,1} EXP(b) pk

Dan Boneh Relation to symmetric cipher security Recall: for symmetric ciphers we had two security notions: One-time security and many-time security (CPA) We showed that one-time security ⇒ many-time security For public key encryption: One-time security ⇒ many-time security (CPA) (follows from the fact that attacker can encrypt by himself) Public key encryption must be randomized

Dan Boneh Security against active attacks attacker sk server pk server to: body body Attacker is given decryption of msgs that start with “to: attacker” What if attacker can tamper with ciphertext? to: body attacker: mail server (e.g. Gmail) Caroline

Dan Boneh (pub-key) Chosen Ciphertext Security: definition E = (G,E,D) public-key enc. over (M,C). For b=0,1 define EXP(b): b Adv. A Chal. (pk,sk)  G() b’  {0,1} challenge: m 0, m 1  M : |m 0 | = |m 1 | c  E(pk, m b ) pk CCA phase 1: c i  C m i  D(k, c i ) CCA phase 2: c i  C : c i ≠ c m i  D(k, c i )

Dan Boneh Chosen ciphertext security: definition Def: E is CCA secure (a.k.a IND-CCA) if for all efficient A: Adv CCA [A, E ] = | Pr[EXP(0)=1] – Pr[EXP(1)=1] | is negligible. Example: Suppose (to: alice, body) (to: david, body) Adv. A b Chal. (pk,sk)  G() b chal.: (to:alice, 0), (to:alice, 1) c  E(pk, m b ) pk CCA phase 2: c’ = ≠c m’  D(sk, c’ ) (to: david, b) c

Dan Boneh Active attacks: symmetric vs. pub-key Recall: secure symmetric cipher provides authenticated encryption [ chosen plaintext security & ciphertext integrity ] Roughly speaking: attacker cannot create new ciphertexts Implies security against chosen ciphertext attacks In public-key settings: Attacker can create new ciphertexts using pk !! So instead: we directly require chosen ciphertext security

Dan Boneh End of Segment This and next module: constructing CCA secure pub-key systems