Kentucky Presentation November, 2006 Cryptography from an art to a science Ganesh Sundaram.

Slides:



Advertisements
Similar presentations
Lecture 5: Cryptographic Hashes
Advertisements

Cryptography and Network Security Chapter 9
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Cryptography and Network Security
1 Cryptanalysis-tolerant CPA crypt. ● Suppose E, E’ are two encryption schemes which on of them is CPA - secure  E.g., a standard and a proprietary, a.
CIS 5371 Cryptography 3b. Pseudorandomness.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
Foundations of Cryptography Lecture 12 Lecturer: Moni Naor.
Information Security Teaching, training, research.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CMSC 456 Introduction to Cryptography
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Chapter 5 Cryptography Protecting principals communication in systems.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
Computer Security CS 426 Lecture 3
Public Key Model 8. Cryptography part 2.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Pseudo-random Number Generation Qiuliang Tang. Random Numbers in Cryptography ► The keystream in the one-time pad ► The secret key in the DES encryption.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
CS 4/585: Cryptography Tom Shrimpton FAB
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
1 Public-Key Cryptography and Message Authentication.
Public key ciphers 2 Session 6.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CPS 290 Computer Security Network Tools Cryptography Basics CPS 290Page 1.
Lecture 2: Introduction to Cryptography
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
PRNGs Pseudo-random number generation. Randomness and Cryptography Randomness and pseudo-randomness are useful in cryptography: –To generate random and.
Chapter 2 Symmetric Encryption.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Cryptography Lecture 19.
Security through Encryption
Cryptography and Network Security Chapter 7
Cryptography Lecture 8.
Two Simple Composition Theorems with H-Coefficients
Cryptography Lecture 15.
Cryptography Lecture 18.
Presentation transcript:

Kentucky Presentation November, 2006 Cryptography from an art to a science Ganesh Sundaram

Kentucky Presentation November, 2006 Reality check Dramatic growth in the use of cryptographic protocols and algorithms  Internet transactions, wireless, storage, etc.. Everyone has their favorite protocol and algorithm  Security by secrecy! Little or no analysis phase  Common complaints include: DES is “too slow”… “I don’t need anything strong”…DES does not fit requirements of “my application” Public key methods “computationally intensive” Little or no analysis leads to a conundrum  Even “alleged” algorithms have been compromised Public relations disaster, costly replacement/recall

Kentucky Presentation November, 2006 Tacit realization Cryptography is more than just encryption  Security is more than just privacy Speed and low complexity very important  From a cost and user experience perspective But cannot keep “re-inventing” algorithms  Just using “confusion and diffusion” principles doesn’t work Need thorough analysis  But don’t have time for thorough analysis (needed it yesterday phenomenon!) Public key cryptography is “good” but cannot be used all the time  Arguably scalable and “well analyzed” but there is some truth to the “computationally inefficient” complaint

Kentucky Presentation November, 2006 More than just encryption & privacy.. Entity and message authentication  Has the user paid his bill?  Has someone tampered with data? Key exchange, generation, management,…  Need keys for everything Pseudorandom generators  One-time-pad style encryption, challenge response protocols Pseudorandom functions, permutations  Session key generation, Block ciphers Etc.

Kentucky Presentation November, 2006 Problem Can we create cryptographic primitives rapidly, to suit different applications, but yet eliminate the long analysis phase?

Kentucky Presentation November, 2006 Don’t invent new stuff Old is good?  Well analyzed algorithms that withstand test of time  But need so many things and have so little time Enter proof theoretic cryptography  Affirmative answer to the problem we stated earlier Create new cryptographic primitives to suit applications based on “old primitives” Eliminate analysis phase Provide a “proof” of security!

Kentucky Presentation November, ft view: proof theoretic approach Start: Choose a “hard problem” Create: Develop procedure “based on” the hard problem to suit requirements of application Given: Requirements Prove: Provide proof of security; often translates to showing that if there is a break in the procedure developed, then there is a solution to hard problem

Kentucky Presentation November, 2006 Example Start: Discrete logarithm problem Create: We will discuss this in some detail today Given: Design pseudorandom generator Prove: We will sketch a proof! Prove that: If there is an “efficient” algorithm to predict the next bit then there is an “efficient” algorithm to solve discrete log problem!

Kentucky Presentation November, 2006 Before that… What is a pseudorandom generator?  Naive definition: Sequence of numbers that are unpredictable  What is unpredictable? Given the first “n” bits, cannot predict the (n+1)-st bit with probability greater than 0.5 –Cannot predict == cannot predict “efficiently”  Describing “efficiently” requires a framework Framework due to Yao as well as Blum-Micali (early 80’s) –Notion of “computational entropy”, different from information theoretic entropy Subsequent work by Levin, Goldreich, etc.

Kentucky Presentation November, 2006 Finite fields and discrete log problem Let p be a prime number Let (Z/(p))* represent the set {1,2,….,(p-1)}  I.e., set of nonzero integers modulo p  Forms a cyclic group under multiplication modulo p  Let g be a generator of this cyclic group  Every element y in the set can be represented as g^x i.e., y = g^x for some x between 1 and p-1 Discrete log problem: Given y and g, find x. We will use this problem to create a pseudorandom generator

Kentucky Presentation November, 2006 Rest of this talk Construction and sketch of proof History and references Kindly allow me to use the whiteboard! Time permits  Another example: Converting pseudorandom functions to pseudorandom permutations Extension: Variable length block ciphers

Kentucky Presentation November, 2006 PRF to PRP: Luby Rackoff ciphers x[1…n] x[n+1…2n] R f2f2 S T  R S f3f3  Original work by Luby and Rackoff  Seminal paper: led to a lot of research Some references:  Patarin Multiple rounds  Naor-Reingold Use hash functions  Patel-Ramzan-Sundaram Char p versions (p>2) f1f1 

Kentucky Presentation November, 2006 The VIL-FIL problem statement Existing cryptographic primitives operate on fixed-input- lengths (FIL); e.g., DES operates on 64-bit blocks In practice one needs to operate on inputs of all sizes; e.g., network packet sizes vary… Therefore, it would be nice if primitives worked on variable- input-lengths (VIL). But, it’s undesirable to design primitives “from scratch.” “Crypto Operations” done only by the FIL primitive. The security of the VIL primitive should provably follow from the security of the FIL primitive. Q: Can we use FIL primitive as building block for VIL primitive?

Kentucky Presentation November, 2006 FIL to VIL SPRP Scheme x[1…n] x[n+1…b] h1h1 y[1…n] y[n+1…b] f1f1 S T  S f2f2  h -1 2 Essentially, we did the Naor-Reingold construction but with an unbalanced Feistel and with round functions of VIL PRFs (which can be constructed using FIL PRP). h 1, h 2 chosen from pairwise independent permutation family; i.e., for all x ≠ y, a ≠ b Pr h [h(x)=a, h(y)=b] ≤  f 1, f 2 are PRFs; it’s easy to create variable input and output length PRFs from a fixed input length one.

Kentucky Presentation November, 2006 ? Thank You! Questions? ? TIME EXPIRED