What is cryptography? Dan Boneh Crypto core Talking Talking - - PowerPoint PPT Presentation

what is cryptography
SMART_READER_LITE
LIVE PREVIEW

What is cryptography? Dan Boneh Crypto core Talking Talking - - PowerPoint PPT Presentation

Online Cryptography Course Dan Boneh Online Cryptography Course Dan Boneh Introduction What is cryptography? Dan Boneh Crypto core Talking Talking Talking Talking to


slide-1
SLIDE 1

Dan Boneh

Introduction What is cryptography?

Online Cryptography Course Dan Boneh Online Cryptography Course Dan Boneh

slide-2
SLIDE 2

Dan Boneh

Crypto core

Secret key establishment: Secure communication:

attacker???

k k

confidentiality and integrity

m1 m2

Alice Bob Talking to Alice Talking to Alice Talking to Bob Talking to Bob

slide-3
SLIDE 3

Dan Boneh

But crypto can do much more

  • Digital signatures
  • Anonymous communication

Alice signature Alice signature Alice

Who did I just talk to? Who did I just talk to? Bob

slide-4
SLIDE 4

Dan Boneh

Alice

But crypto can do much more

  • Digital signatures
  • Anonymous communication
  • Anonymous digital cash

– Can I spend a “digital coin” without anyone knowing who I am? – How to prevent double spending?

Who was that? Who was that?

Internet

1$

(anon. comm.)

slide-5
SLIDE 5

Dan Boneh

Protocols

  • Elections
  • Private auctions
slide-6
SLIDE 6

Dan Boneh

Protocols

  • Elections
  • Private auctions
  • Secure multi-party computation

Goal: compute f(x1, x2, x3, x4) “Thm:” anything the can done with trusted auth. can also be done without

trusted authority trusted authority

slide-7
SLIDE 7

Dan Boneh

Crypto magic

  • Privately outsourcing computation
  • Zero knowledge (proof of knowledge)

Alice search query

What did she search for? What did she search for?

results I know the factors of N !! proof π

??? ???

E[ query ] E[ results ]

Alice

N=p∙q

Bob

N

slide-8
SLIDE 8

Dan Boneh

A rigorous science

The three steps in cryptography:

  • Precisely specify threat model
  • Propose a construction
  • Prove that breaking construction under

threat mode will solve an underlying hard problem

slide-9
SLIDE 9

Dan Boneh

Introduction

History

Online Cryptography Course Dan Boneh Online Cryptography Course Dan Boneh

slide-10
SLIDE 10

Dan Boneh

History

David Kahn, “The code breakers” (1996)

slide-11
SLIDE 11

Dan Boneh

Symmetric Ciphers

slide-12
SLIDE 12

Dan Boneh

Few Historic Examples (all badly broken)

  • 1. Substitution cipher

k :=

slide-13
SLIDE 13

Dan Boneh

Caesar Cipher (no key)

slide-14
SLIDE 14

Dan Boneh

What is the size of key space in the substitution cipher assuming 26 letters?

|ࣥ| = 26 |ࣥ| = 226 𝒧 = 26! (26 factorial) |ࣥ| = 262

slide-15
SLIDE 15

Dan Boneh

How to break a substitution cipher?

What is the most common letter in English text? “X” “L” “E” “H”

slide-16
SLIDE 16

Dan Boneh

How to break a substitution cipher?

(1) Use frequency of English letters (2) Use frequency of pairs of letters (digrams)

slide-17
SLIDE 17

Dan Boneh

An Example

UKBYBIPOUZBCUFEEBORUKBYBHOBBRFESPVKBWFOFERVNBCVBZPRUBOFERVNBCVBPCYYFVUFO FEIKNWFRFIKJNUPWRFIPOUNVNIPUBRNCUKBEFWWFDNCHXCYBOHOPYXPUBNCUBOYNRVNIWN CPOJIOFHOPZRVFZIXUBORJRUBZRBCHNCBBONCHRJZSFWNVRJRUBZRPCYZPUKBZPUNVPWPCYVF ZIXUPUNFCPWRVNBCVBRPYYNUNFCPWWJUKBYBIPOUZBCUIPOUNVNIPUBRNCHOPYXPUBNCUB OYNRVNIWNCPOJIOFHOPZRNCRVNBCUNENVVFZIXUNCHPCYVFZIXUPUNFCPWZPUKBZPUNVR

B 36 N 34 U 33 P 32 C 26  E  T  A NC 11 PU 10 UB 10 UN 9  IN  AT UKB 6 RVN 6 FZI 4  THE digrams trigrams

slide-18
SLIDE 18

Dan Boneh

  • 2. Vigener cipher (16’th century, Rome)

k = C R Y P T O C R Y P T O m = W H A T A N I C E D A Y T O D A Y C R Y P T

(+ mod 26)

c = Z Z Z J U C L U D T U N W G C Q S

suppose most common = “H” first letter of key = “H” – “E” = “C”

slide-19
SLIDE 19

Dan Boneh

  • 3. Rotor Machines (1870-1943)

Early example: the Hebern machine (single rotor)

A B C . . X Y Z A B C . . X Y Z K S T . . R N E K S T . . R N E E K S T . . R N E K S T . . R N N E K S T . . R N E K S T . . R key

slide-20
SLIDE 20

Dan Boneh

Rotor Machines (cont.)

Most famous: the Enigma (3-5 rotors) # keys = 264 = 218 (actually 236 due to plugboard)

slide-21
SLIDE 21

Dan Boneh

  • 4. Data Encryption Standard (1974)

DES: # keys = 256 , block size = 64 bits Today: AES (2001), Salsa20 (2008) (and many others)