Cryptography Lecture 0 Manoj Prabhakaran University of Illinois - - PowerPoint PPT Presentation

cryptography
SMART_READER_LITE
LIVE PREVIEW

Cryptography Lecture 0 Manoj Prabhakaran University of Illinois - - PowerPoint PPT Presentation

Cryptography Lecture 0 Manoj Prabhakaran University of Illinois Urbana-Champaign In the News Properly implemented strong crypto systems are one of the few things that you can rely on. In the News Properly implemented strong


slide-1
SLIDE 1

Cryptography

Manoj Prabhakaran

University of Illinois Urbana-Champaign

Lecture 0

slide-2
SLIDE 2

In the News

“Properly implemented strong crypto systems are one of the few things that you can rely on. ”

slide-3
SLIDE 3

In the News

“Properly implemented strong crypto systems are one of the few things that you can rely on. ” “… Unfortunately, endpoint security is so terrifically weak that [the adversary] can frequently find ways around it. ”

slide-4
SLIDE 4

What is Cryptography?

slide-5
SLIDE 5

What is Cryptography?

It’ s all about controlling access to information

slide-6
SLIDE 6

What is Cryptography?

It’ s all about controlling access to information A tool for enforcing policies on who can learn and/or influence information

slide-7
SLIDE 7

What is Cryptography?

It’ s all about controlling access to information A tool for enforcing policies on who can learn and/or influence information Do we know what we are talking about?

slide-8
SLIDE 8

What is information?

slide-9
SLIDE 9

What is information?

Or rather the lack of it?

slide-10
SLIDE 10

What is information?

Or rather the lack of it? Uncertainty

slide-11
SLIDE 11

What is information?

Or rather the lack of it? Uncertainty The word is Entropy

slide-12
SLIDE 12

What is information?

Or rather the lack of it? Uncertainty The word is Entropy Borrowed from thermodynamics

slide-13
SLIDE 13

What is information?

Or rather the lack of it? Uncertainty The word is Entropy Borrowed from thermodynamics

Rudolf Clausius

slide-14
SLIDE 14

What is information?

Or rather the lack of it? Uncertainty The word is Entropy Borrowed from thermodynamics

Rudolf Clausius Ludwig Boltzmann

slide-15
SLIDE 15

What is information?

Or rather the lack of it? Uncertainty The word is Entropy Borrowed from thermodynamics

Rudolf Clausius Ludwig Boltzmann Claude Shannon

slide-16
SLIDE 16

What is information?

Or rather the lack of it? Uncertainty The word is Entropy Borrowed from thermodynamics An inherently “probabilistic” notion

Rudolf Clausius Ludwig Boltzmann Claude Shannon

slide-17
SLIDE 17

What is information?

Claude Shannon

slide-18
SLIDE 18

What is information?

Information Theory: ways to quantify information

Claude Shannon

slide-19
SLIDE 19

What is information?

Information Theory: ways to quantify information Application 1: to study efficiency

  • f communication (compression,

error-correction)

Claude Shannon

slide-20
SLIDE 20

What is information?

Information Theory: ways to quantify information Application 1: to study efficiency

  • f communication (compression,

error-correction) Application 2: to study the possibility of secret communication

Claude Shannon

slide-21
SLIDE 21

What is information?

Information Theory: ways to quantify information Application 1: to study efficiency

  • f communication (compression,

error-correction) Application 2: to study the possibility of secret communication The latter turned out to be a relatively easy question! Secret communication possible only if (an equally long) secret key is shared ahead of time

Claude Shannon

slide-22
SLIDE 22

Access to Information

slide-23
SLIDE 23

Access to Information

A second look

slide-24
SLIDE 24

Access to Information

A second look Information at hand may still not be “accessible” if it is hard to work with it

slide-25
SLIDE 25

Access to Information

A second look Information at hand may still not be “accessible” if it is hard to work with it Computation!

slide-26
SLIDE 26

Access to Information

A second look Information at hand may still not be “accessible” if it is hard to work with it Computation! Shannon’ s information may reduce uncertainty only for computationally all-powerful parties

slide-27
SLIDE 27

Computational Complexity

slide-28
SLIDE 28

Computational Complexity

A systematic study of what computationally bounded parties can and cannot do

slide-29
SLIDE 29

Computational Complexity

A systematic study of what computationally bounded parties can and cannot do A young and rich field

Alan Turing Stephen Cook Leonid Levin Richard Karp

slide-30
SLIDE 30

Computational Complexity

A systematic study of what computationally bounded parties can and cannot do A young and rich field Much known, much more unknown

Alan Turing Stephen Cook Leonid Levin Richard Karp

slide-31
SLIDE 31

Computational Complexity

A systematic study of what computationally bounded parties can and cannot do A young and rich field Much known, much more unknown Much “believed”

Alan Turing Stephen Cook Leonid Levin Richard Karp

slide-32
SLIDE 32

Computational Complexity

A systematic study of what computationally bounded parties can and cannot do A young and rich field Much known, much more unknown Much “believed”

Alan Turing Stephen Cook Leonid Levin Richard Karp

Basis of the Modern Theory of Cryptography

slide-33
SLIDE 33

Compressed Secret-Keys

slide-34
SLIDE 34

Compressed Secret-Keys

Impossible in the information-theoretic sense: 
 a truly random string cannot be compressed

slide-35
SLIDE 35

Compressed Secret-Keys

Impossible in the information-theoretic sense: 
 a truly random string cannot be compressed But possible against computationally bounded players: use pseudo-random strings!

slide-36
SLIDE 36

Compressed Secret-Keys

Impossible in the information-theoretic sense: 
 a truly random string cannot be compressed But possible against computationally bounded players: use pseudo-random strings! Pseudo-random number generator

slide-37
SLIDE 37

Compressed Secret-Keys

Impossible in the information-theoretic sense: 
 a truly random string cannot be compressed But possible against computationally bounded players: use pseudo-random strings! Pseudo-random number generator a.k.a Stream Cipher

slide-38
SLIDE 38

Compressed Secret-Keys

Impossible in the information-theoretic sense: 
 a truly random string cannot be compressed But possible against computationally bounded players: use pseudo-random strings! Pseudo-random number generator a.k.a Stream Cipher Generate a long string of random-looking bits from a short random seed

Andy Yao Manuel Blum

slide-39
SLIDE 39

The Public-Key Revolution

slide-40
SLIDE 40

The Public-Key Revolution

“Non-Secret Encryption”

James Ellis

slide-41
SLIDE 41

The Public-Key Revolution

“Non-Secret Encryption” No a priori shared secrets

James Ellis

slide-42
SLIDE 42

The Public-Key Revolution

“Non-Secret Encryption” No a priori shared secrets Instead, a public key. Anyone can create encryptions, only the creator of the key can decrypt!

James Ellis

slide-43
SLIDE 43

The Public-Key Revolution

“Non-Secret Encryption” No a priori shared secrets Instead, a public key. Anyone can create encryptions, only the creator of the key can decrypt!

Clifford Cocks James Ellis

slide-44
SLIDE 44

The Public-Key Revolution

“Non-Secret Encryption” No a priori shared secrets Instead, a public key. Anyone can create encryptions, only the creator of the key can decrypt!

Clifford Cocks Malcolm Williamson James Ellis

slide-45
SLIDE 45

The Public-Key Revolution

“Non-Secret Encryption” No a priori shared secrets Instead, a public key. Anyone can create encryptions, only the creator of the key can decrypt!

Clifford Cocks Malcolm Williamson Merkle, Hellman, Diffie James Ellis

slide-46
SLIDE 46

The Public-Key Revolution

“Non-Secret Encryption” No a priori shared secrets Instead, a public key. Anyone can create encryptions, only the creator of the key can decrypt! Publicly verifiable digital signatures

Clifford Cocks Malcolm Williamson Merkle, Hellman, Diffie James Ellis Shamir, Rivest, Adleman

slide-47
SLIDE 47

The Public-Key Revolution

“Non-Secret Encryption” No a priori shared secrets Instead, a public key. Anyone can create encryptions, only the creator of the key can decrypt! Publicly verifiable digital signatures Forms the backbone of today’ s secure communication

Clifford Cocks Malcolm Williamson Merkle, Hellman, Diffie James Ellis Shamir, Rivest, Adleman

slide-48
SLIDE 48

Crypto-Mania

slide-49
SLIDE 49

Crypto-Mania

Public-Key cryptography and beyond!

slide-50
SLIDE 50

Crypto-Mania

Public-Key cryptography and beyond! Secret computation: collaboration among mutually distrusting parties

slide-51
SLIDE 51

Crypto-Mania

Public-Key cryptography and beyond! Secret computation: collaboration among mutually distrusting parties Compute on distributed data, without revealing their private information to each other

slide-52
SLIDE 52

Crypto-Mania

Public-Key cryptography and beyond! Secret computation: collaboration among mutually distrusting parties Compute on distributed data, without revealing their private information to each other Compute on encrypted data

slide-53
SLIDE 53

Crypto-Mania

Public-Key cryptography and beyond! Secret computation: collaboration among mutually distrusting parties Compute on distributed data, without revealing their private information to each other Compute on encrypted data And other fancy things... with sophisticated control

  • ver more complex “access” to information
slide-54
SLIDE 54

Crypto-Mania

Public-Key cryptography and beyond! Secret computation: collaboration among mutually distrusting parties Compute on distributed data, without revealing their private information to each other Compute on encrypted data And other fancy things... with sophisticated control

  • ver more complex “access” to information

Do it all faster, better, more conveniently and more securely (or find out if one cannot). And also make sure we know what we are trying to do.

slide-55
SLIDE 55

Crypto-Mania

Public-Key cryptography and beyond! Secret computation: collaboration among mutually distrusting parties Compute on distributed data, without revealing their private information to each other Compute on encrypted data And other fancy things... with sophisticated control

  • ver more complex “access” to information

Do it all faster, better, more conveniently and more securely (or find out if one cannot). And also make sure we know what we are trying to do.

slide-56
SLIDE 56
slide-57
SLIDE 57
slide-58
SLIDE 58

Independence, Indistinguishability, Infeasibility, Zero-Knowledge, ...

slide-59
SLIDE 59

Independence, Indistinguishability, Infeasibility, Zero-Knowledge, ... E n c r y p t i

  • n

, A u t h e n t i c a t i

  • n
slide-60
SLIDE 60

Independence, Indistinguishability, Infeasibility, Zero-Knowledge, ... E n c r y p t i

  • n

, A u t h e n t i c a t i

  • n

D E S , A E S , S H A , H M A C

slide-61
SLIDE 61

Independence, Indistinguishability, Infeasibility, Zero-Knowledge, ... R S A , e l l i p t i c c u r v e g r

  • u

p s , l a t t i c e s , . . . E n c r y p t i

  • n

, A u t h e n t i c a t i

  • n

D E S , A E S , S H A , H M A C

slide-62
SLIDE 62

Independence, Indistinguishability, Infeasibility, Zero-Knowledge, ...

  • ne-way functions,

collision-resistant hash functions, ... Semantic security, non- malleability, existential unforgeability... Obfuscation, Leakage resilient crypto, Imperfect randomness, ... R S A , e l l i p t i c c u r v e g r

  • u

p s , l a t t i c e s , . . . PK Encryption, Signatures E n c r y p t i

  • n

, A u t h e n t i c a t i

  • n

Stream ciphers, Block ciphers Pseudorandomness generators, PRF , ... Random Oracle Model, Generic group model S S L , T S L Identity-Based Encryption S e c u r e M u l t i

  • P

a r t y C

  • m

p u t a t i

  • n

S e c r e t s h a r i n g , V e r i fi a b l e S e c r e t s h a r i n g Z K p r

  • f

s Concrete cryptanalysis (Birthday attacks, differential cryptanalysis, ...) Blind signatures, Mix-nets, DC-nets,... e-cash, e-Voting, Fair Exchange, Privacy Preserving Datamining, ... D E S , A E S , S H A , H M A C Hybrid encryption Algorithms, Reductions M a l w a r e , D D

  • S

, S i d e

  • c

h a n n e l s U n i v e r s a l c

  • m

p

  • s

i t i

  • n

Signcryption Formal methods

slide-63
SLIDE 63

In This Course

slide-64
SLIDE 64

In This Course

(how to tame the elephant...)

slide-65
SLIDE 65

In This Course

Fundamental notions: secrecy, infeasibility

(how to tame the elephant...)

slide-66
SLIDE 66

In This Course

Fundamental notions: secrecy, infeasibility Secure communication (encryption, authentication): definitions, building blocks, construction

(how to tame the elephant...)

slide-67
SLIDE 67

In This Course

Fundamental notions: secrecy, infeasibility Secure communication (encryption, authentication): definitions, building blocks, construction And much more: Secure multi-party computation, computing on encrypted data, bleeding edge crypto, quick and dirty crypto...

(how to tame the elephant...)

slide-68
SLIDE 68

In This Course

Fundamental notions: secrecy, infeasibility Secure communication (encryption, authentication): definitions, building blocks, construction And much more: Secure multi-party computation, computing on encrypted data, bleeding edge crypto, quick and dirty crypto... Project: You can pick a topic for surveying/research,

  • r an implementation project

(how to tame the elephant...)

slide-69
SLIDE 69

In This Course

Fundamental notions: secrecy, infeasibility Secure communication (encryption, authentication): definitions, building blocks, construction And much more: Secure multi-party computation, computing on encrypted data, bleeding edge crypto, quick and dirty crypto... Project: You can pick a topic for surveying/research,

  • r an implementation project

A few assignments

(how to tame the elephant...)

slide-70
SLIDE 70

In This Course

(how to tame the elephant...)

slide-71
SLIDE 71

In This Course

http:/ /courses.engr.illinois.edu/cs598man/sp2016/

(how to tame the elephant...)

slide-72
SLIDE 72

In This Course

http:/ /courses.engr.illinois.edu/cs598man/sp2016/ A textbook for the first part of the course: 
 Katz and Lindell

(how to tame the elephant...)

slide-73
SLIDE 73

In This Course

http:/ /courses.engr.illinois.edu/cs598man/sp2016/ A textbook for the first part of the course: 
 Katz and Lindell Cryptutor Wiki

(how to tame the elephant...)

slide-74
SLIDE 74

In This Course

http:/ /courses.engr.illinois.edu/cs598man/sp2016/ A textbook for the first part of the course: 
 Katz and Lindell Cryptutor Wiki Office Hours: TBA

(how to tame the elephant...)

slide-75
SLIDE 75

Cryptography

The Big Picture

slide-76
SLIDE 76

Cryptography

The Big Picture

Information Security

slide-77
SLIDE 77

Cryptography

The Big Picture

Information Security Complexity Theory

slide-78
SLIDE 78

Cryptography

The Big Picture

Information Security Information Theory Complexity Theory

slide-79
SLIDE 79

Cryptography

The Big Picture

Number Theory, Algebra Information Security Information Theory Complexity Theory

slide-80
SLIDE 80

Cryptography

The Big Picture

Number Theory, Algebra Information Security Information Theory Formal Methods Complexity Theory

slide-81
SLIDE 81

Cryptography

The Big Picture

Number Theory, Algebra Information Security Information Theory Formal Methods Complexity Theory Combinatorics, Graph theory

slide-82
SLIDE 82

Cryptography

The Big Picture

Number Theory, Algebra Information Security Information Theory Formal Methods Complexity Theory Combinatorics, Graph theory

Cryptography is only a small (but vital) part of information security

slide-83
SLIDE 83

Cryptography

The Big Picture

Number Theory, Algebra Information Security Information Theory Formal Methods Complexity Theory Combinatorics, Graph theory

Cryptography is only a small (but vital) part of information security Cryptography studies several problems which may not be of immediate use in information security, but is important in building its own foundations/in establishing links with other areas

slide-84
SLIDE 84

Cryptography

The Big Picture

Number Theory, Algebra Information Security Information Theory Formal Methods Complexity Theory Combinatorics, Graph theory

Cryptography is only a small (but vital) part of information security Cryptography studies several problems which may not be of immediate use in information security, but is important in building its own foundations/in establishing links with other areas Cryptography has an “engineering” component (e.g. SSL/TSL) and a “science” component (e.g. definitions, proofs).

slide-85
SLIDE 85

Puzzle #1

slide-86
SLIDE 86

Puzzle #1

Alice and Bob hold secret numbers x and y in {0,..,n} resp.

slide-87
SLIDE 87

Puzzle #1

Alice and Bob hold secret numbers x and y in {0,..,n} resp. Carol wants to learn x+y. Alice and Bob are OK with that.

slide-88
SLIDE 88

Puzzle #1

Alice and Bob hold secret numbers x and y in {0,..,n} resp. Carol wants to learn x+y. Alice and Bob are OK with that. But they don’ t want Carol/ each other to learn anything else!

slide-89
SLIDE 89

Puzzle #1

Alice and Bob hold secret numbers x and y in {0,..,n} resp. Carol wants to learn x+y. Alice and Bob are OK with that. But they don’ t want Carol/ each other to learn anything else!

i.e., Alice should learn nothing about y, nor Bob about x. Carol shouldn’ t learn anything else about x,y “other than” x+y

slide-90
SLIDE 90

Puzzle #1

Alice and Bob hold secret numbers x and y in {0,..,n} resp. Carol wants to learn x+y. Alice and Bob are OK with that. But they don’ t want Carol/ each other to learn anything else!

i.e., Alice should learn nothing about y, nor Bob about x. Carol shouldn’ t learn anything else about x,y “other than” x+y

Can they do it, just by talking to each other (using private channels between every pair of parties)?

slide-91
SLIDE 91

Puzzle #2

Alice and Bob hold secret bits x and y Carol wants to learn x∧y. Alice and Bob are OK with that. But they don’ t want Carol/ each other to learn anything else!

i.e., Alice should learn nothing about y, nor Bob about x. Carol shouldn’ t learn anything else about x,y “other than” x∧y

Can they do it, just by talking to each other (using private channels between every pair of parties)?