SYMMETRIC ENCRYPTION
Mihir Bellare UCSD 1
SYMMETRIC ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric - - PowerPoint PPT Presentation
SYMMETRIC ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric encryption scheme SE = ( K , E , D ) consists of three algorithms: K and E may be randomized, but D must be deterministic. Mihir Bellare UCSD 2 Correct decryption requirement More
Mihir Bellare UCSD 1
Mihir Bellare UCSD 2
Mihir Bellare UCSD 3
$
Mihir Bellare UCSD 4
Mihir Bellare UCSD 5
K (C[i])
Mihir Bellare UCSD 6
Mihir Bellare UCSD 7
Mihir Bellare UCSD 8
Mihir Bellare UCSD 9
Mihir Bellare UCSD 10
Mihir Bellare UCSD 11
$
$
Mihir Bellare UCSD 12
Mihir Bellare UCSD 13
Mihir Bellare UCSD 14
$
K (C[i]) ⊕ C[i − 1]
Mihir Bellare UCSD 15
$
Mihir Bellare UCSD 16
$
K ! This is why CTR$ can use a family of functions
Mihir Bellare UCSD 17
$
$
Mihir Bellare UCSD 18
$
$
Mihir Bellare UCSD 19
Mihir Bellare UCSD 20
$
$
Mihir Bellare UCSD 21
Mihir Bellare UCSD 22
0, ..., Mq
1, ..., Mq 1 ,
0| = |Mi 1| for all 1 ≤ i ≤ q. Adversary, given ciphertexts C 1, . . . ,
0, M1 1) and
0, M2 1) and gets back C 2, and so on.
Mihir Bellare UCSD 23
$
$
$
$
SE⇒1
SE⇒1
SE
SE⇒1
SE⇒1
UCSD 24
Mihir Bellare UCSD 25
SE
SE
SE
Mihir Bellare UCSD 26
SE
SE⇒1
SE⇒1
Mihir Bellare UCSD 27
SE
SE⇒1
SE⇒1
Mihir Bellare UCSD 28
Mihir Bellare UCSD 29
$
SE⇒1
Mihir Bellare UCSD 30
$
SE⇒1
Mihir Bellare UCSD 31
$
SE⇒1
Mihir Bellare UCSD 32
$
SE⇒1
Mihir Bellare UCSD 33
SE
1
SE = 1
SE = 1
Mihir Bellare UCSD 34
SE
Mihir Bellare UCSD 35
$
Mihir Bellare UCSD 36
SE
Mihir Bellare UCSD 37
$
$
Mihir Bellare UCSD 38
$
$
Mihir Bellare UCSD 39
$
$
Mihir Bellare UCSD 40
$
$
$
$
SE⇒1
Mihir Bellare UCSD 41
$
$
$
$
SE⇒1
Mihir Bellare UCSD 42
SE
SE⇒1
SE⇒1
Mihir Bellare UCSD 43
SE
Mihir Bellare UCSD 44
q2 2n+1
Mihir Bellare UCSD 45
q2 2n+1
Mihir Bellare UCSD 46
SE
E (B) + 2(q − 1)σ
Mihir Bellare UCSD 47
Mihir Bellare UCSD 48
$
Mihir Bellare UCSD 49
Mihir Bellare UCSD 50
SE
E (B) + σ2
Mihir Bellare UCSD 51
Mihir Bellare UCSD 52
Mihir Bellare UCSD 53