cryptology
play

Cryptology Cryptology = Cryptography + Cryptanalysis Usage: - PowerPoint PPT Presentation

An introduction to Cryptology 1 2015/03/ EMA, Franceville, Gabon Damien Robert quipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathmatiques de Bordeaux quipe MACISA, Laboratoire International de Recherche en Informatique et


  1. An introduction to Cryptology 1 2015/03/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux Équipe MACISA, Laboratoire International de Recherche en Informatique et Mathématiques Appliquées 1 A big thanks to my colleagues of the Caramel team in Nancy who provided most of the content for this course

  2. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Cryptology Cryptology = Cryptography + Cryptanalysis Usage: SSL/TLS, ssh, gpg GSM, Wifi, Bluetooth Credit Card, Transport card, Passport Remark Cryptology ⊂ Security

  3. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Public Canal Alice communicates with Bob through a public canal. Eve does passive attacks on this canal (spying) and Charlie does active attacks. Active attacks: Usurpation of identity; Altering data; Repudiation Replay, repetition Man in the middle Delay, Destruction

  4. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Primitives Confidentiality Symmetric encryption, Asymmetric encryption Integrity Cryptographic hash functions Authenticity Signature, MAC

  5. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Primitives Confidentiality Symmetric encryption, Asymmetric encryption Integrity Cryptographic hash functions Authenticity Signature, MAC

  6. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Primitive Without key: hash, random generator With key symmetric MAC Encryption: stream, block asymmetric: number theory, codes, lattices… signature Encryption

  7. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Confidentiality, Authenticity Confidentiality: E : { 0,1 } n → { 0,1 } n a permutation; D = E − 1 . Encryption: m �→ c = E ( m ) , Decryption: c �→ m = D ( c ) . Authenticity: c = A ( m ) . Alice sends ( m , v ) . Bob receives ( m ′ , v ′ ) . Verification: V ( m ′ , v ′ ) = OK, NOT OK.

  8. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Kerchoff’s laws So no external validation of security possible; And transmitting the algorithmes in painful; E and D needs to be secret; Kerchoff: parametrizes the algorithms by a key K ; E : { 0,1 } n × { 0,1 } k → { 0,1 } n such that E ( · , K ) is a permutation for all K ; E can be public, the only secret is the secret key K .

  9. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Channels of communications Public Authenticated Confidential Authenticated + Confidential Goals Using a authenticated and/or confidential channel, construct an authenticated and/or confidential channels inside a public channel. The goal if of course to use the preexisting authenticated/confidential channel as little as possible, and do everything else in the authenticated/confidential channel constructed inside the public channel.

  10. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Example 1: integrity Security: Preimage resistance; Second-Preimage resistance; Collision resistance. Alice sends m through the public channel, and h ( m ) through the integrity channel, where h : { 0,1 } ∗ → { 0,1 } 256 is a cryptographic hash function.

  11. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Example 2: authenticity (symmetric) through a authenticated and confidential channel. Alice sends A secret key K is generated (randomisation) and sent to Alice and Bob ( m ,MAC ( m , K )) through the public channel. Bob verify via VERIF ( m , K ) . The MAC is a hash function parametrized by K . Security: from several couples ( M , C ) Can’t retrieve K ; Can’t generate a new ( M ′ , C ′ ) ; Can’t distinguish the distribution C from a uniform distribution.

  12. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Example 2: authenticity (asymmetric) Signature vs MAC: Public verification Non repudiation A couple ( K S , K P ) is generated by Alice and she sends the public key K P to Bob via an authenticated channel. Alice sends ( m ,SIGN ( m , K S )) through the public channel, and Bob verify via VERIF ( m , K P ) . Security: from several couples ( M , C ) and K P Can’t retrieve K S ; Can’t generate a new ( M ′ , C ′ ) ; Can’t distinguish the distribution C from a uniform distribution.

  13. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Example 3: confidentiality (symmetric) attack) A secret key K is generated (randomisation) and sent to Alice and Bob through a authenticated and confidential channel. Alice sends c = E ( m , K ) through the public channel, Bob decrypts via m = D ( c , K ) . Security: from several ciphers C , several couples ( M , C = E ( M , K )) (chosen plain text attack) and several couples ( C , M = D ( M , K )) (chosen cipher text Can’t retrieve K ; Can’t find M ′ from a new C ′ ; Can’t distinguish the distribution C from a uniform distribution.

  14. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Example 3: confidentiality (asymmetric) cipher text attack) A couple ( K S , K P ) is generated by Bob and he sends the public key K P to Alice via an authenticated channel. Alice sends c = E ( m , K P ) through the public channel, and Bob decrypt via m = D ( c , K S ) . Security: from K P , several ciphers C , several couples ( M , C = E ( M , K )) (chosen plain text attack) and several couples ( C , M = D ( M , K )) (chosen Can’t retrieve K S ; Can’t find M ′ from a new C ′ ; Can’t distinguish the distribution C from a uniform distribution.

  15. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Asymmetric vs symmetric Does not need a confidential channel; Much slower. to the symmetric channel to increase speed. N persons ⇒ N keys rather than N 2 ; ⇒ Use an asymmetric cipher to send a symmetric secret key and switch

  16. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Security Only cipher known Chosen plain text: CPA, Adaptative chosen plain text: CPA2 Chosen cipher text: CCA, Adaptative chosen cipher text: CCA2 Ultimate goal: IND-CCA2 cryptosystem. Attacks: Black box or structural analysis; Side channels. ⇒ Invert the function: OW (One Wayness) ⇒ Indistiguinbility: IND. Detect an encryption of 1 from an encryption of 0 with probability > 0.5 + ǫ . IND = Semantic security.

  17. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Security parameters Remark very long term security and for protection against potential attacks. For (and completely kill others like factorisation or the discrete logarithm problem). 2 40 : One minute on a standard computer; 2 60 : One year on a standard computer; 2 80 : One year with 10 6 cores at 5 G H z = NSA? 2 128 : security goal. One may want to take higher security parameters 192 bits or 256 bits for instance quantum computers can divide by 2 the security of some problems

  18. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography One way function Origin: hash table to speed up lookup Very important in cryptology, needs strong properties Example Example One way function x �→ f ( x ) easy, but y �→ f − 1 ( y ) hard. Multiplication, exponentiation in ( � / p � ∗ , × ) . In asymmetric key cryptography, use of trapdoor one way function: a secret trap can allows to compute f − 1 . If N = pq , x �→ x 2 is a trapdoor one way function.

  19. Concepts Randomness and hash function Stream ciphers Block ciphers Public key cryptography Hash function Origin: hash table to speed up lookup; Very important in cryptology, needs strong properties: No preimage No second preimage No collision Example A checksum is not an hash function MD5 (Broken), SHA-1 (Almost broken), SHA-2, SHA-3 h : { 0,1 } ∗ → { 0,1 } n ; x �→ x 2 mod pq is one way but not a cryptographic hash function.

  20. Concepts Collision Randomness and hash function So we have the inequalities (in fact it is an order of equivalence) Public key cryptography Block ciphers Stream ciphers Let h be an hash function with n bits of output; N = 2 n . Given y ∊ { 0,1 } n , finding y at random requires Θ ( 2 n ) tries; What about a collision: x 1 � = x 2 | h ( x 1 ) = h ( x 2 ) ? After k tries, the probability of not finding a collision is p ( k ) = ( 1 − 1 / N )( 1 − 2 / N ) ... ( 1 − k / N ) � � i / N � − k 2 / 2 N log p ( k ) = log ( 1 − i / N ) � − i p ( k ) � exp ( − k 2 / 2 N ) � So if k = Θ ( N ) , p ( k ) is small and the probability of collision is high; To get 128 bits of security we need n = 256

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend