Light Lightweight Cryptography Pascal Lafourcade (LIMOS, France) - - PowerPoint PPT Presentation

light lightweight cryptography
SMART_READER_LITE
LIVE PREVIEW

Light Lightweight Cryptography Pascal Lafourcade (LIMOS, France) - - PowerPoint PPT Presentation

Light Lightweight Cryptography Pascal Lafourcade (LIMOS, France) Takaaki Mizuki (Tohoku University, Japan) Atsuki Nagao (Ochanomizu University, Japan) Kazumasa Shinagawa (Tokyo Tech / AIST, Japan) 1 2 3 4 5 6 Material 7 Agenda 1.


slide-1
SLIDE 1

Lightweight Cryptography

Pascal Lafourcade (LIMOS, France) Takaaki Mizuki (Tohoku University, Japan) Atsuki Nagao (Ochanomizu University, Japan) Kazumasa Shinagawa (Tokyo Tech / AIST, Japan)

1

Light

slide-2
SLIDE 2

2

slide-3
SLIDE 3

3

slide-4
SLIDE 4

4

slide-5
SLIDE 5

5

slide-6
SLIDE 6

6

slide-7
SLIDE 7

Material

7

slide-8
SLIDE 8

Agenda

8

  • 1. Introduction
  • Physical cryptography
  • Related works
  • 2. Light cryptography
  • Model
  • Set-Intersection protocol
  • Min/Max protocol
  • Addition protocol
  • 3. Conclusion
slide-9
SLIDE 9

Agenda

9

  • 1. Introduction
  • Physical cryptography
  • Related works
  • 2. Light cryptography
  • Model
  • Set-Intersection protocol
  • Min/Max protocol
  • Addition protocol
  • 3. Conclusion
slide-10
SLIDE 10

Background

10

  • Modern cryptography is more and more used and complex
  • Teaching cryptography is hard
  • Complex algorithm
  • Security
  • Deep mathematics
  • Not visualized

OUR GOAL : a good educational tool for cryptography

slide-11
SLIDE 11

Physical cryptography

11

  • Cryptography using physical objects (e.g. playing cards)
  • Suitable for education
  • Good visualization
  • Concrete
  • Introduction to cryptographic concepts
  • No need of mathematics knowledge
slide-12
SLIDE 12

Light cryptography

12

New model of physical cryptography

  • Computation based on light and shadows
  • Easy to understand
  • Secure
slide-13
SLIDE 13

Related works

13

  • Zero-knowledge proof for “Where’

s Wally” [1]

  • Proof that “I know Wally’

s position” without revealing the position

  • Visual secret sharing [2]
  • Secret image is reconstructed

by stacking two transparent sheets

  • Card-based protocols [3]
  • Secure computation protocol

using a deck of cards (like playing cards)

[1] Naor, Naor, and Reingold, “Applied Kid Cryptography or How To Convince Your Children You Are Not Cheating”, EUROCRYPT 1999. [2] Naor and Shamir, “Visual Cryptography”, EUROCRYPT 1994. [3] den Boer, “More Efficient Match-Making and Satisfiability The Five Card Trick”, EUROCRYPT 1989.

slide-14
SLIDE 14

Agenda

14

  • 1. Introduction
  • Physical cryptography
  • Related works
  • 2. Light cryptography
  • Model
  • Set-Intersection protocol
  • Min/Max protocol
  • Addition protocol
  • 3. Conclusion
slide-15
SLIDE 15

Properties of shadows

15

  • It is sometimes hard to imagine its original shape from shadows
slide-16
SLIDE 16

16

slide-17
SLIDE 17

Properties of shadows

17

The resulting shadow is the union of shadows Shadow addition

slide-18
SLIDE 18

Protocols of Light Cryptography

18

  • Start: Each party has a secret input xi
  • Goal: Compute a joint function f(x1, x2, …, xn) with hiding secrets
  • 1. Each party has an input sheet
  • 2. Depending on own input, each party makes holes in the sheet

Input sheet if xi = 0 Step 2 if xi = 1 hole

slide-19
SLIDE 19

Protocols of Light Cryptography

19

  • 3. Each party inserts own input sheet in the hiding box (B)
  • 4. (A) is illuminating by the light
  • 5. The result image is printed on the screen

A net of the box

slide-20
SLIDE 20

How to “securely” have an agreement

20

Alice Bob Yes Yes Yes No No Yes No No

→ agreement → disagreement

}

<latexit sha1_base64="i7hWC0vdcfMUI6A2sTujQSDq0gQ=">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</latexit>

Determine the current situation without revealing inputs directly if Yes if No

slide-21
SLIDE 21

How to “securely” have an agreement

21

Alice Bob Yes Yes Yes No No Yes No No

→ agreement → disagreement

}

<latexit sha1_base64="i7hWC0vdcfMUI6A2sTujQSDq0gQ=">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</latexit>

Determine the current situation without revealing inputs directly if Yes if No Computation of an AND

slide-22
SLIDE 22

How to “securely” have an agreement

22

Alice Bob Yes Yes Yes No No Yes No No

→ agreement → disagreement

}

<latexit sha1_base64="i7hWC0vdcfMUI6A2sTujQSDq0gQ=">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</latexit>

Determine the current situation without revealing inputs directly if Yes if No

NOBODY LEARNS OTHER CHOICE

Computation of an AND

slide-23
SLIDE 23

Schedule a meeting for next month?

23

slide-24
SLIDE 24

Transparent sheets

24

  • Input sheets also can be implemented by transparent sheets
  • Each party fills it by a black pen or a black-colored seals

The black image is printed on transparent sheets

transparent black pen

Depending on input, some circles are filled by a black pen

slide-25
SLIDE 25

Scheduling (set-intersection)

25

Bob’ s schedule Alice’ s schedule

result Input sheet

NOBODY LEARNS OTHER CHOICE

slide-26
SLIDE 26

Compute the maximum of salaries ?

26

slide-27
SLIDE 27

Max protocol

27

Bob’ s input = 16 Alice’ s input = 33 Input sheet

result = 33

NOBODY LEARNS OTHER CHOICE

slide-28
SLIDE 28

Compute the minimum of salaries ?

28

slide-29
SLIDE 29

Min protocol

29

Bob’ s input = 70 Alice’ s input = 24 Input sheet

result = 24

NOBODY LEARNS OTHER CHOICE

slide-30
SLIDE 30

Compute who is the millionaire?

30

slide-31
SLIDE 31

Max with name

31

Bob’ s input = 50 Alice’ s input = 33

NOBODY LEARNS OTHER CHOICE

Input sheet Carol’ s input = 50

slide-32
SLIDE 32

Compute the sum of numbers ?

32

slide-33
SLIDE 33

Addition protocol 0

33

Bob’ s input = 2 Alice’ s input = 1 Input sheet: Carol’ s input = 3

  • The output image is randomized
  • If two circles are collude, the output is not correct
slide-34
SLIDE 34

Addition protocol 1

34

Bob’ s input = 2 Alice’ s input = 1 Input sheet: Carol’ s input = 3

  • The output image is randomized
  • If two circles are collude, the output is not correct
slide-35
SLIDE 35

Addition protocol 2

35

Bob’ s input = 2 Alice’ s input = 1 Input sheet: Carol’ s input = 3

  • Use instead of
  • The collision probability is reduced
slide-36
SLIDE 36

Conclusion

36

CONTRIBUTIONS:

  • Light cryptography is a new model of physical cryptography
  • Secure computation based on light and shadows :
  • Max/Minimum
  • Addition
  • Schedule
slide-37
SLIDE 37

Future directions

37

  • Use it in cryptography courses
  • Designe more protocols : Subtraction ? Multiplication ?
  • Study more about physical cryptography

Design Test Feedback

slide-38
SLIDE 38

Questions ?

38