One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Cryptanalysis-tolerant CPA crypt. ● Suppose E, E’ are two encryption schemes which on of them is CPA - secure  E.g., a standard and a proprietary, a.
CIS 5371 Cryptography 3b. Pseudorandomness.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Block Ciphers and the Data Encryption Standard
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Computability and Complexity 20-1 Computability and Complexity Andrei Bulatov Random Sources.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Stream Ciphers.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
HSC: Building Stream Cipher from Secure Hash Functions Juncao Li Nov. 29 th 2007 Department of Computer Science Portland State University.
Ref. Cryptography: theory and practice Douglas R. Stinson
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Intro To Encryption Exercise 1. Monoalphabetic Ciphers Examples:  Caesar Cipher  At Bash  PigPen (Will be demonstrated)  …
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
CryptographyPerfect secrecySlide 1 Today What does it mean for a cipher to be: –Computational secure? Unconditionally secure? Perfect secrecy –Conditional.
Chapter 2 Basic Encryption and Decryption (part B)
Computer Security CS 426 Lecture 3
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
CS526Topic 3: One-time Pad and Perfect Secrecy 1 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
symmetric key cryptography
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Stream Cipher. A stream cipher breaks the message M into successive characters or bits m 1, m 2,..., and enciphers each m i with the ith element k i of.
Stream Ciphers Making the one-time pad practical.
13. BETTER SYMMETRIC CIPHER STREAM CIPHERS 1. SOME TRICKS FOR SUBSTITUTION CIPHER There are some tricks to make substitution cipher safer: Nulls: insert.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Stream Cipher July 2011.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
DIFFERENTIAL CRYPTANALYSIS Chapter 3.4. Ciphertext only attack. The cryptanalyst knows the cryptograms. This happens, if he can eavesdrop the communication.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Introduction to Modern Symmetric-key Ciphers
Lecture 2: Introduction to Cryptography
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
1/9 최신정보보호기술 경일대학교 사이버보안학과 김 현성. 읽기 단계 (1) 문장 분석  주어, 동사  구, 절, 관계사, and or  모르는 단어 찾기 (2) 의미 파악  문맥의 흐름에 맞는 단어의 의미 찾기 (3) 문맥 연계  앞뒷 문장과 연계한 문장의.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
University of Malawi, Chancellor College
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Attacks on Public Key Encryption Algorithms
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Stream Cipher.
B504/I538: Introduction to Cryptography
STREAM CIPHERS by Jennifer Seberry.
Topic 13: Message Authentication Code
Information Security CS 526 Topic 3
Randomness and Statistical Tests
Stream Cipher Structure
Presentation transcript:

One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004

OTP System The one-time pad, which is a provably secure cryptosystem, was developed by Gilbert Vernam in The message is represented as a binary string (a sequence of 0’s and 1’s using a coding mechanism such as ASCII coding. The key is a truly random sequence of 0’s and 1’s of the same length as the message. The encryption is done by adding the key to the message modulo 2, bit by bit. This process is often called exclusive or, and is denoted by XOR. The symbol  is used

exclusive or Operator ab c = a  b

Example message =‘IF’ then its ASCII code =( ) key = ( ) Encryption: plaintext key ciphertext Decryption: ciphertext key plaintext

Why OTP is provably secure? The security depends on the randomness of the key. It is hard to define randomness. In cryptographic context, we seek two fundamental properties in a binary random key sequence: Unpredictability: Balanced (Equal Distribution):

Why OTP is provably secure? Unpredictability: Independent of the number of the bits of a sequence observed, the probability of guessing the next bit is not better than ½. Therefore, the probability of a certain bit being 1 or 0 is exactly equal to ½. Balanced (Equal Distribution): The number of 1’s and 0’s should be equal.

Mathematical Proof the probability of a key bit being 1 or 0 is exactly equal to ½. The plaintext bits are not balanced. Let the probability of 0 be x and then the probability of 1 turns out to be 1-x. Let us calculate the probability of ciphertext bits.

Mathematical Proof m i prob. k i prob.c i prob. 0 x0 ½0 ½ x 0 x1 ½1 ½ x 1 1-x0 ½1 ½ (1-x) 1 1-x1 ½0 ½ (1-x) We find out the probability of a ciphertext bit being 1 or 0 is equal to (½)x + (½)(1-x) = ½. Ciphertext looks like a random sequence.

OTP is basic idea for stream cipher Encryption : mi : plain-text bits. ki : key (key-stream ) bits ci : cipher-text bits. Decryption : Provably Secure.

Generator Properties Randomness Provable security Bit rate Key length Complexity of algorithm Memory Resistant against every attack

Drawback in OTP Key-stream should be as long as plain-text. Key distribution & Management difficult.

Solution Stream Ciphers in which key- stream is a solution Stream cipher generated in pseudo-random fashion from relatively short secret key.

Stream Cipher Property Randomness : Closely related to unpredictability. Pseudo-randomness :PR sequences appears random to a computationally bounded adversary. Stream Ciphers can be modeled as Finite- state machine.

Stream Cipher Model S i F G S i+1 kiki mimi cici S i : state of the cipher at time t = i. F : state function. G : output function. Initial state, output and state functions are controlled by the secret key.

Stream Cipher Types Synchronous Stream Cipher Self-Synchronizing Stream Ciphers

Synchronous Stream Ciphers Key-stream is independent of plain and cipher-text. Both sender &receiver must be synchronized. Resynchronization can be needed. No error propagation. Active attacks can easily be detected.

Synchronous Stream Ciphers

Self-Synchronizing Stream Ciphers Key-stream is a function of fixed number t of cipher-text bits. Limited error propagation (up to t bits). Active attacks cannot be detected. At most t bits later, it resynchronizes itself when synchronization is lost. It helps to diffuse plain-text statistics.

Self-Synchronizing Stream Ciphers