1
Encryption
Debdeep Mukhopadhyay IIT Kharagpur
Notion of Security
- “A Good disguise should not reveal the
Encryption Debdeep Mukhopadhyay IIT Kharagpur Notion of Security - - PDF document
Encryption Debdeep Mukhopadhyay IIT Kharagpur Notion of Security A Good disguise should not reveal the persons height Shafi Goldwasser and Silvio Micali, 1982 1 Design of Encryption Algorithms Encryption algorithms are
n *
For every distribution X over {0,1} and For every partial information h: {0,1} {0,1} For every interesting information f: {0,1} {0,1} For every attacking algorithm A running in time t' t(n) [t(n)
n n n
→ → ≤
k
m X (p , ) ( )
is a polynomial in n], there exists a simulating algorithm S such that: Pr [ ( ( , ), , ( )) ( )] Pr [ ( ( )) ( )] ( )
k
k k m X s G n
A E m p p h m f m S h m f m n ε
← ← ←
= ≤ = +
k
1 i {0,1} (p , ) ( )
k
n i k k s G n
∈ ←
k
1 1 m X (p , ) ( )
k
k k m X s G n
← ← ←
k
i {0,1} (p , ) ( )
k
i k k s G n
∈ ←
1 * ( , ) ( ) 1 ( , ) ( )
k k k k
n p s G n k k p s G n k k
∈ ∈
k (p , ) ( ) (p , ) ( ) k k (p , ) ( ) k
i {0,1} (p , ) ( ) 1
1, if ( , ) Define, '( , )= 0, otherwise Pr [ '( ( , ), ) ] 1 1 Pr [ '( ( , ), ) 0] Pr [ '( ( , ), ) 1] 2 2 1 (1 Pr [ ( ( , ), ) 2
k s G n s G n k k s G n k
i k k s G n k k k k k k
A c p a A c p A E m p p i A E m p p A E m p p A E m p p a
← ← ←
∈ ←
= ⎧ ⎨ ⎩ ∴ = = = + = = − =
(p , ) ( ) k (p , ) ( ) (p , ) ( ) k k
1 1
1 ]) Pr [ ( ( , ), ) ] 2 1 1 (Pr [ ( ( , ), ) ] Pr [ ( ( , ), ) ]) 2 2 1 ( ) ( , ) is violated. 2
s G n k s G n s G n k k
k k k k k k
A E m p p a A E m p p a A E m p p a n t MI
← ← ←
+ = = + = − = > +∈ ⇒ ∈ −
define ( ), where z is some information on m Pick ( , ) ( ) at random Return ( (0, ), , ) /* Note that the run time of S is running time of A+poly(n) */
k k k k
S z p s G n A E p p z ∈
k k k
m X (p , ) ( ) m X (p , ) ( ) m X (p , ) ( )
(t',2 )-SS Pr [ ( ( , ), , ( )) ( )] Pr [ ( ( )) ( )] 2 ( ) , Pr [ ( ( , ), , ( )) ( )] Pr [ ( (0, ), , ( )) (
k k k
k k m X s G n k k s G n k k s G n
A E m p p h m f m S h m f m n
A E m p p h m f m A E p p h m f ε ε
← ← ← ← ← ← ←
¬ ⇒ = > = + = > =
k k k
(p , ) ( ) m (p , ) ( ) (p , ) ( )
)] 2 ( ) , Pr[ ](Pr [ ( ( , ), , ( )) ( )] Pr [ ( (0, ), , ( )) ( )]) 2 ( ) ' , st. Pr [ ( ( ', ), , ( ')) ( ')]
k k k
s G n k k s G n k k s G n k k
m n
X m A E X p p h X f X A E p p h X f X n m X A E m p p h m f m ε ε
← ← ←
+ = = − = > ⇒ ∃ ∈ =
k
(p , ) ( )
Pr [ ( (0, ), , ( ')) ( ')]) 2 ( ) as there exists a pair of messages for which (*) does not hold ( , ) does not hold.
k
s G n k k
A E p p h m f m n t MI ε
←
− = > ⇒ ⇒ ∈ −