outline cpsc 418 math 318 introduction to cryptography
play

Outline CPSC 418/MATH 318 Introduction to Cryptography Historical - PowerPoint PPT Presentation

Outline CPSC 418/MATH 318 Introduction to Cryptography Historical Ciphers 1 Classical Ciphers, Perfect Secrecy, One-Time Pad Probability Theory 2 Renate Scheidler Department of Mathematics & Statistics Perfect Secrecy 3 Department of


  1. Outline CPSC 418/MATH 318 Introduction to Cryptography Historical Ciphers 1 Classical Ciphers, Perfect Secrecy, One-Time Pad Probability Theory 2 Renate Scheidler Department of Mathematics & Statistics Perfect Secrecy 3 Department of Computer Science University of Calgary Vernam One-Time Pad Week 2 4 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 1 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 2 / 39 Historical Ciphers Historical Ciphers Classical Ciphers Examples of Classical Ciphers Examples of substitution ciphers: Shift cipher: to encrypt, every plaintext letter is shifted by a fixed Classical ciphers usually belong to one of the following two types: position substitution or transposition ciphers. monoalphabetic : one cipher alphabet Vigen` ere cipher: plaintext letters are shifted by different positions Definition 1 (Substitution cipher) based on a repeated rotating pattern (see handouts) polyalphabetic : several cipher alphabets A cipher for which encryption replaces each plaintext symbol by some ciphertext symbol without changing the order of the plaintext symbols. Examples of transposition ciphers: Route cipher: plaintext is arranged in some geometric figure and Definition 2 (Transposition cipher) encrypted by rearranging the plaintext according to some route A cipher in which the ciphertext is a rearrangement ( i.e. permutation) of through the figure the plaintext symbols. e.g. in a columnar transposition cipher, the plaintext is arranged in a rectangle and the ciphertext consists of a secret permutation of the plaintext columns Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 3 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 4 / 39

  2. Historical Ciphers Historical Ciphers Past Uses of Substitution Ciphers Cryptanalysis of Monoalphabetic Substitution Ciphers History: 1 Highly vulnerable to KPA’s: each portion of corresponding plaintext Mary Queen of Scotts conspiring to overthrow Queen Elizabeth I and and ciphertext reveals some of the cipher. gain the English throne Eg. For shift ciphers, one letter pair reveals the key! Famous 1917 WW I Zimmerman telegram Navajo Code talkers in WW II 2 Each plaintext letter is encrypted to the same ciphertext letter . Frequent ciphertext letters correspond to common plaintext letters Literature: Pairs of identical ciphertext letters correspond to such paintext letter Edgar Allan Poe’s The Gold Bug pairs ( e.g. “XX” corresponds to “yy”) Arthur Conan Doyle’s The Adventure of the Dancing Men (a 3 Language redundancy generally yields the key, given a sufficient Sherlock Holmes story) amount of ciphertext (COA). Kabalistic texts, writings of Jewish mysticism and the biblical book of frequency distribution of the plaintext alphabet (letters, pairs of letters, Jeremiah use the atbash cipher (encrypts via alphabet reversal) triples of letters etc.) in a given language can be established statistically and compared with the ciphertext (see frequency and A pathological example (which would not work for frequency analysis): digraph handouts). Gadsby by Ernest Vincent Wright (1939) is a 50,000 word novel written entirely without using the letter E Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 5 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 6 / 39 Historical Ciphers Historical Ciphers Cryptanalysis of Other Classical Ciphers Modern Usage Polyalphabetic substitution ciphers and transposition ciphers are also vulnerable to KPAs and COAs. Individually, substitution ciphers and transposition ciphers are generally Cryptanalysis of Vigen` ere cipher: insecure. Determine the length of rotation patterns (i.e. the number of cipher However, when alternating them repeatedly, alphabets) via guessing, the kappa test or Kasiski’s factoring method Cryptanalyze each subtext as a shift cipher M − → T − → S − → T − → S − → · · · − → T − → S − → C , Cryptanalysis of columnar transposition: they become very secure. Guess the dimensions of the rectangle This idea, due to Claude Shannon , is the basis of the design of modern Determine the order of the columns via frequency counts (which will symmetric cryptosystems. be the same as for English text). Place columns adjacent to each other if they produce common latter pairs ( e.g. QX is extremely unlikely, but EN is highly likely). Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 7 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 8 / 39

  3. Probability Theory Probability Theory Information Theory Partial Information Claude Shannon is widely hailed as the “father of information theory”. seminal work in the late 1940’s and early 1950’s in this field For example, partial information reveals the full word or phrase in: credited with turning cryptography into a scientific discipline. Abbreviations — “LOL” in addition, modern satellite transmission would not be possible Contractions — “I’ve” without his work Omitted vowels — “BSKTBLL” Glyphs — smiley face Information theory measures the amount of information conveyed by a piece of data. How much partial information is enough? E.g. “BLL” could mean “ball”, captures how much partial information you need to have in order to “bell”, “bill”, “bull”, . . . obtain full information. Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 9 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 10 / 39 Probability Theory Probability Theory Definitions for Probability Theory Joint and Conditional Probability Definition 3 Let X and Y be random variables, x ∈ X and y ∈ Y . Sample space – a finite set X = { X 1 , X 2 , . . . , X n } whose elements are Definition 4 called outcomes . Joint probability p ( x , y ): probability that p ( X = x ) and p ( Y = y ). Probability distribution on X – a complete set of probabilities; i.e. Conditional probability p ( x | y ): probability that p ( X = x ) given that n p ( Y = y ). � p ( X 1 ) , p ( X 2 ) , . . . , p ( X n ) ≥ 0 with p ( X i ) = 1 . i =1 Joint and conditional probabilities are related as follows: Random variable – a pair X consisting of a sample space X and a p ( x , y ) = p ( x | y ) p ( y ) . probability distribution p on X . The (a priori) probability that X takes on the value x ∈ X is denoted by p ( X = x ) or simply p ( x ). Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 11 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 12 / 39

  4. Probability Theory Probability Theory Bayes’ Theorem Independence Definition 5 Two random variables X , Y are independent if p ( x , y ) = p ( x ) p ( y ) for all Theorem 1 (Bayes Theorem) x ∈ X and y ∈ Y . If p ( y ) > 0 , then Example 6 p ( x | y ) = p ( x ) p ( y | x ) . p ( y ) A fair coin toss is modeled by a random variable on the sample space X = { heads, tails } so that p (heads) = p (tails) = 1 / 2. Two fair coin tosses in a row represent independent events as each of the 4 possible Proof. outcomes has (joint) probability 1 / 4. Clearly p ( x , y ) = p ( y , x ), so p ( x | y ) p ( y ) = p ( y | x ) p ( x ). Now divide by p ( y ). Corollary 2 X and Y are independent if and only if p ( x | y ) = p ( x ) for all x ∈ X , y ∈ Y with p ( y ) > 0 . Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 13 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 14 / 39 Perfect Secrecy Perfect Secrecy Idea of Perfect Secrecy Setup We consider the following three probability distributions: A random variable on the message space M ; plaintexts M occur with Recall the notion of unconditional security which requires that an probabilities p ( M ) such that � M ∈M p ( M ) = 1 . adversary with unlimited computing power cannot defeat the system. This A random variable on the ciphertext space C ; ciphertexts C occur relates to perfect secrecy . with probabilities p ( C ) such that � C ∈C p ( C ) = 1 . A random variable on the key space K ; keys K are selected with prior Intuitively, for perfect secrecy, ciphertexts should reveal no information probabilities p ( K ) such that � K ∈K p ( K ) = 1 . whatsoever about plaintexts. We assume that the random variables on K and M are independent, as Theoretically unbreakable! keys are usually chosen before the plaintext is ever seen. Most of the time, each key is selected with equal likelyhood 1 / |K| , regardless of the nature of the messages to be encrypted. Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 15 / 39 Renate Scheidler (University of Calgary) CPSC 418/MATH 318 Week 2 16 / 39

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend