Top Banner
Introduction to Modern Cryptography Master of Logic 2012 2nd Quarter Nov / Dec
25

Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Jun 23, 2019

Download

Documents

hoangngoc
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Introduction to Modern Cryptography

Master of Logic 2012

2nd Quarter Nov / Dec

Page 2: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Christian Schaffner

• me• pure mathematics at ETH Zurich• PhD from Aarhus, Denmark• research: quantum cryptography• [email protected]

• plays ultimate frisbee

Page 3: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Maria Velema

• your teaching assistant• MoL student• [email protected]

• switched sides of the table

Page 4: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

• Historical cryptography & principles of modern cryptography

• perfectly-secret encryption

Outline of the Course

Page 5: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Outline of the Course II

secret key public key

confidentiality

authentication

private-key encryption

public-key encryption

message authentication codes (MAC)

digital signatures

Page 6: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Outline of the Course II

secret key public key

confidentiality

authentication

private-key encryption

public-key encryption

message authentication codes (MAC)

digital signatures

• reduction proofs• pseudorandomness• block ciphers: DES, AES

Page 7: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Outline of the Course II

secret key public key

confidentiality

authentication

private-key encryption

public-key encryption

message authentication codes (MAC)

digital signatures

• reduction proofs• pseudorandomness• block ciphers: DES, AES

• algorithmic number theory• key distribution, Diffie-Hellmann• RSA

Page 8: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Fun Stuff

• zero-knowledge proofs

• multi-party computation (secret sharing, bit commitment, oblivious transfer)

• electronic voting and auctions

• quantum cryptography

• position-based cryptography

• ...

Page 9: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Questions ?

Page 10: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Introduction

• for centuries, cryptography has been an “art of writing codes and solving codes”

• goal: secret communication

• mainly used by military and intelligence

• “modern cryptography”

Page 11: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Claude Elwood Shannon1916 - 2001

• Father of Information Theory• Graduate of MIT• Bell Labs

• juggling, unicycling, chess• ultimate machine

Page 12: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Silvio Micali Shafi Goldwasser

• MIT• Foundations of Modern Cryptography

Oded Goldreich

• Weizmann Institute

Page 13: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Modern Cryptography• “scientific study of techniques for securing

digital information, transactions and distributed computations”

• crypto is everywhere!

Page 14: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Auguste Kerckhoffs1835 - 1903

• Dutch linguist and cryptographer• Kerckhoffs’ principle: “A cryptosystem should be secure even if everything about the system, except the key, is public knowledge”

• leader of Volapük movement

Page 15: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

AES and SHA competitions

• AES: advanced encryption standard

• SHA: secure hash algorithm

• both determined by a public procedure led by the National Institute for Standards and Technology (NIST)

• SHA-3 zoo

Page 16: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Gaius Julius Caesar100 BC – 44 BC

• not best known for his cryptographic skills

• Roman general

• suffered from epilepsy, or migraine headache

Page 17: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Modular Arithmetic

• Given integers a and N>1 we write [a mod N] ∈ {0,1,2, ..., N-1}as the remainder of a upon division by N

Page 19: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Blaise de Vigenère1523–1596

• diplomat and cryptographer• Vigenère’s cipher

• interested in alchemy

Page 21: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Charles Babbage1791 – 1871

• mathematician, philosopher, inventor and mechanical engineer

• father of the computer• designed the “difference machine”

and “Analytical Engine”

• counted broken window panes• hated organ grinders

Page 22: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

Jonathan Katz Yehuda Lindell

• 3 Basic Principles of Modern Cryptography

Page 23: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

1. Formulation of Exact Definitions

• “a cryptographic scheme is secure if no adversary of a specified power can achieve a specified break”example: encryption

• mathematical definitions vs the real worldexample: power-usage attacks

• cryptographers face a similar problem as Turing: “Am I modeling the right thing?”

Page 24: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

2. Reliance on Precise Assumptions

• unconditional security is often impractical(unfortunate state of computational complexity)

• validation of assumptions (independent of cryptography)example: factoring

• allows to compare crypto schemes

Page 25: Introduction to Modern Cryptography - homepages.cwi.nlschaffne/courses/crypto/2012/Heads1.pdf · 3. Rigorous Proofs of Security • Intuition is not good enough. History knows countless

3. Rigorous Proofs of Security

• Intuition is not good enough. History knows countless examples of broken schemes

• bugs vs security holessoftware users vs adversaries

• reduction proofs: Given that Assumption X is true, Construction Y is secure.Any adversary breaking Construction Y can be used as subroutine to violate Assumption X.