cryptography definitions and terms
play

Cryptography: Definitions and Terms C etin Kaya Ko c - PowerPoint PPT Presentation

Cryptography Definitions and Terms Cryptography: Definitions and Terms C etin Kaya Ko c koc@cs.ucsb.edu ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 1 / 14 Cryptography Definitions and Terms Terminology - Old & New


  1. Cryptography Definitions and Terms Cryptography: Definitions and Terms C ¸etin Kaya Ko¸ c koc@cs.ucsb.edu ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 1 / 14

  2. Cryptography Definitions and Terms Terminology - Old & New Greek, Latin: krupt¯ e, crypta (vault, burial chamber) crypt , to encrypt, to decrypt, encryption, decryption, encryption algorithm, decryption algorithm, cryptography, cryptanalysis, cryptology ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 2 / 14

  3. Cryptography Definitions and Terms Terminology - Old & New Arabic, Latin, French: ¸ sifr, , cifra, cifre (zero, empty) cipher , to encipher, to decipher, ciphertext, plaintext Informal: code, to encode, to decode, coding algorithm, secret codes ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 3 / 14

  4. Cryptography Definitions and Terms Codes - Error Detection & Correction In coding theory: The adversary is the Nature You want to send a piece of data over a channel The sender gives her data to the channel (encoding) The Nature attacks (indiscriminately) and may flip, destroy or duplicate bits The receiver obtains the “received” data The receiver wants the intended message (correct data) Error detection: Is the received data correct? Yes or No Error correction: Can you get the correct data from the received data? ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 4 / 14

  5. Cryptography Definitions and Terms Cryptography - Achieve Confidentiality In cryptology: The Adversary is another intelligent being The sender wants to send a piece of data over a channel The sender gives her data to the channel (encryption) The Adversary is always present The receiver obtains the received data (decryption) What did the Adversary learn? Is the data still confidential? ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 5 / 14

  6. Cryptography Definitions and Terms Cryptanalysis Scenarios - Kerckhoffs’ Principle Kerckhoffs’ Principle: The adversary knows the algorithm Auguste Kerckhoffs (1835-1903) was a Dutch linguist and cryptographer who was a professor of languages at the ´ Ecole des Hautes ´ Etudes Commerciales in Paris in the late 19th century. ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 6 / 14

  7. Cryptography Definitions and Terms Cryptanalysis Scenarios - Ciphertext & Plaintext Ciphertext only: C 1 , C 2 , C 3 , . . . Known plaintext: A set of ( M i , C i ) for i = 1 , 2 , 3 , . . . , n Chosen plaintext: Choose any M i and obtain C i for i = 1 , 2 , 3 , . . . , n Chosen ciphertext: Choose any C i and obtain M i for i = 1 , 2 , 3 , . . . , n Chosen text: Chosen plaintext + Chosen ciphertext Batch versus Adaptive chosen text “Lunchtime attacks” ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 7 / 14

  8. Cryptography Definitions and Terms Cryptographic Algorithms For every cryptographic algorithm (cipher): Describe and understand the algorithm, input/output encoding scheme, encryption and decryption algorithms Block cipher vs stream cipher Input/output (plaintext/ciphertext) size Key size, key space, and key space size HW/SW platforms, performance issues → applied cryptography Cryptanalysis ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 8 / 14

  9. Cryptography Definitions and Terms Cryptanalysis Scenarios CO: Ciphertext Only; C 1 , C 2 , C 3 , . . . [all ciphertexs] KP: Known Plaintext: A set of ( M i , C i ) for i = 1 , 2 , . . . , n CP: Chosen Plaintext: Choose any M i and obtain C i for i = 1 , 2 , . . . , n CC: Chosen Ciphertext: Choose any C i and obtain M i for i = 1 , 2 , . . . , n CT: Chosen Text: Chosen plaintext + Chosen ciphertext ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 9 / 14

  10. Cryptography Definitions and Terms Cryptanalysis Methods Exhaustive key search → Computing power, Moore’s Law Mathematical approaches → Creativity Quantum computer [ under the cryptanalysis scenarios CO, KP, CP, CC, CT ] ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 10 / 14

  11. Cryptography Definitions and Terms Exhaustive Key Search From the description of the algorithm, obtain the key size, key space, and the size of the key space (the total number of keys) Consider the scenarios: CO, KP, CP, CC, CT Write code and/or build a special-purpose computer Cost to build the (hw/sw) machine & time to obtain the key BIG QUESTION: Are there ciphers that cannot be cryptanalyzed with infinite amount of resources? ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 11 / 14

  12. Cryptography Definitions and Terms Mathematical Approaches Under the scenarios (CO, KP, CP, CC, CT), we consider how the plaintext or the key can be found using less resources (time/money) than the exhaustive search It seems that we would have a different approach for each cipher; However, there are classes of ciphers, requiring similar approaches Mathematically and algorithmically rich history Overnight fame is guaranteed if you “break” a commonly used cipher! Or: overnight riches ... with some possibility of jail time! :( ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 12 / 14

  13. Cryptography Definitions and Terms Quantum Computer A quantum computer is composed of 1. A register containing of n qubits 2. Multiqubit logic gates applied to the register according to an algorithm 3. A measurement system determining the states of selected qubits at the end of computation Many problems in computer science are intractable on classical computers because there are too many possible inputs (or states) Due to superposition principle, a single quantum register is capable of simultaneously storing and processing all of the classical inputs at once A quantum computer is useful only if you have a quantum algorithm to solve a particular intractable problem ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 13 / 14

  14. Cryptography Definitions and Terms Quantum Computers and Cryptography Many public-key cryptographic algorithms (those relying on factorization problem and discrete logarithm problem) are breakable on a large enough quantum computer due to Shor’s algorithm However, the research on quantum computer has not given us a reliable and large quantum computer (yet) There is a new body of research named post-quantum cryptography which refers to cryptographic algorithms that cannot (possibly) be broken on a quantum computer Quantum cryptography refers to research on using quantum mechanical techniques to achieve communication secrecy or quantum key distribution ( http://cs.ucsb.edu/~koc ) intro to crypto lect01a intro 14 / 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend