Data and information security: 2. Classical cryptography

Size: px
Start display at page:

Download "Data and information security: 2. Classical cryptography"

Transcription

1 ICS 423: s Data and information security: 2. Classical cryptography UHM ICS 423 Fall 2014

2 Outline ICS 423: s s and crypto systems ciphers ciphers Breaking ciphers What did we learn?

3 Outline ICS 423: s s and crypto systems Definitions Coding vs encryption ciphers Definitions Coding vs encryption ciphers Breaking ciphers What did we learn?

4 Simple crypto system ICS 423: s Definition Definitions Coding vs encryption Given the types M of plaintexts C of ciphertexts K of keys

5 Simple crypto system ICS 423: s Definition Definitions Coding vs encryption... a simple crypto-system is a triple of algorithms S = K, E, D where K :K is called the key generation, E :K M Cis the encryption, and D :K C Mis the decryption

6 Simple crypto system ICS 423: s Definition Definitions Coding vs encryption... that together provide unique decryption: D(K, E(K, m)) = m (where K is the public key of K, classically K = K ) trapdoor encryption: ( ) A :C M. m. A(E(K, m))= m = ( c. A(c) = D(K, c) )

7 Using a cryptosystem ICS 423: s Definitions Coding vs encryption

8 ICS 423: s Definition Definitions Coding vs encryption A ciphers K is a pair of easily computable functions: encryption E K :M C, and decryption D K :C M, obtained when the key generation K of a crypto system S = K, E, D generates the key K.

9 Where do the plaintexts come from? ICS 423: s Remarks The spacemmay be monoalphabetic: it consists of symbols M = Σ polyalphabetic: it consists of blocks of symbols Definitions Coding vs encryption M = Σ N

10 Where do the plaintexts come from? ICS 423: s Remarks The spacemmay be monoalphabetic: it consists of symbols M = Σ polyalphabetic: it consists of blocks of symbols Definitions Coding vs encryption M = Σ N A plaintext is a string fromm.

11 Where do the plaintexts come from? ICS 423: s Remarks The spacemmay be monoalphabetic: it consists of symbols M = Σ polyalphabetic: it consists of blocks of symbols Definitions Coding vs encryption M = Σ N A plaintext is a string fromm. A well-formed message is a meaningful plaintext: a word, a sentence, a paragraph.

12 Where do the plaintexts come from? ICS 423: s Remarks The spacemmay be monoalphabetic: it consists of symbols M = Σ polyalphabetic: it consists of blocks of symbols Definitions Coding vs encryption M = Σ N A plaintext is a string fromm. A well-formed message is a meaningful plaintext: a word, a sentence, a paragraph. Not every plaintext is a well-formed message.

13 Coding ICS 423: s Definitions Coding vs encryption Definition A coding scheme is an injective function f :X G, where X is a source, and G Σ is a language (or code).

14 Recall the examples of coding Morse code: source: characters code: strings of dots and dashes telegraphic codes: ICS 423: s Definitions Coding vs encryption source answer my question! are you trying to weasel out? you are a skunk! not clearly coded, please repeat CODE LYOUI BYOXO BMULD AYYLU English, Chinese... : source: meaningful phrases code: orthography

15 Coding vs encryption ICS 423: s Definitions Coding vs encryption Terminology The elementsγ G Σ are called codewords. Codewords are used as well-formed messages.

16 Coding vs encryption ICS 423: s Definitions Upshot The difference between decryptionc D M Coding vs encryption decodingm G plays an important role in cryptanalysis: plaintext must be recognizable as a well-formed message

17 Outline ICS 423: s s and crypto systems ciphers ciphers Breaking ciphers What did we learn?

18 Examples ICS 423: s Encode letters as numbers a b c c e f g h i j k l m n o p q r s t u v w x y z

19 Example 1.1: Shift cipher (monoalphabetic: Cæsar k = 3, ROT13 k = ) ICS 423: s M =C=Z 26 ={0, 1, 2, 3,..., 25} K =Z 26 K = k E(k, m) = m+k mod 26 D(k, c) = c k mod 26

20 Example 1.1: Shift cipher (monoalphabetic: Cæsar k = 3, ROT13 k = ) E.g., the key k = 5 gives tx: i t i s v e r y c o l d m k c CY: N Y N X A J W D H T Q I ICS 423: s where a b c d e f g h i j k l m n o p q r s t u v w x y z

21 Example 1.2: Shift cipher (polyalphabetic) ICS 423: s M =C=Z N 26 K =Z N 26 K = k = k 1, k 2,...,k N E( k, m) = m+ k mod 26 D( k, c) = c k mod 26

22 Example 1.2: Shift cipher (polyalphabetic) E.g., the block length N = 6 and the keyword kd="monkey" give ICS 423: s tx: i t i s v e r y c o l d m kd: m o n k e y m o n k e y k c CY: U H V C Z B C M P Y P B where a b c c e f g h i j k l m n o p q r s t u v w x y z

23 Example 1.2: Shift cipher (polyalphabetic) One-time pad A polyalphabetic shift cipher where each key K Z N is used to encrypt 26 ICS 423: s a single message m Z N 26 is called a one-time-pad. It is perfectly secure, but it reduces the task to transfer an N-character message to the task to transfer an N-character key.

24 Example 1.2: Shift cipher (polyalphabetic) One-time pad A polyalphabetic shift cipher where some key K Z N is used to encrypt 26 ICS 423: s two messages m 1, m 2 Z N 26 is insecure.

25 Example 1.2: Shift cipher (polyalphabetic) One-time pad A polyalphabetic shift cipher where some key K Z N is used to encrypt 26 ICS 423: s two messages m 1, m 2 Z N 26 is insecure. Exercise Try to figure this out.

26 Example 1.2: Shift cipher (polyalphabetic) One-time pad A polyalphabetic shift cipher where some key K Z N is used to encrypt 26 ICS 423: s two messages m 1, m 2 Z N 26 is insecure. Exercise Try to figure this out. (We ll prove it later.)

27 Example 1.2: Shift cipher (polyalphabetic) Historic remarks Polyalphabetic shift ciphers are often called Vigenère s ciphers. Vigenère had nothing to do with them. He designed the first auto-keying cipher in Shift ciphers were described by Belasso in ICS 423: s Binary one-time pad was patented by Gilbert Vernam in 1917.

28 Example 1.3: Affine cipher (polyalphabetic) M =C=Z N 26, K = ( Z 26) N Z N 26 K = a, k ICS 423: s E( a, k, m) = a m+ k mod 26 D( a, k, c) = 1 a ( c k) mod 26 where a m = a 1 m 1, a 2 m 2,...,a N m N =,,..., a a 1 a 2 a N

29 Example 1.4: Substitition cipher (monoalphabetic) ICS 423: s M =C=Σ={a, b, c,...,z}, K = S(Σ) = the permutations of Σ K =σ E(σ, m) =σ(m) D(σ, c) =σ 1 (c)

30 Example 1.5: Substitition cipher (polyalphabetic) ICS 423: s M =C=Σ N, K = S(Σ) N K =σ E(σ, m) = σ 1 (m 1 ),σ 2 (m 2 ),...σ N (m N ) D(σ, c) = σ 1 1 (c 1),σ 1 2 (c 2),...σ 1 N (c N)

31 Outline ICS 423: s s and crypto systems ciphers ciphers Breaking ciphers What did we learn?

32 Example 2: cipher ICS 423: s M =C=Σ N, K = S(N) = the permutations of the block positions K =σ E(σ, m) = m σ(1), m σ(2),...m σ(n) D(σ, c) = m σ 1 (1), m σ 1 (2),...m σ 1 (N)

33 Example 2.1: Columnar cipher ICS 423: s Plaintext

34 Example 2.1: Columnar cipher ICS 423: s Encryption

35 Example 2.1: Columnar cipher ICS 423: s text

36 Outline ICS 423: s s and crypto systems ciphers ciphers Breaking ciphers What did we learn?

37 Cryptanalytic attacks Symmetric key attacks When k = k = K, the attacks are ciphertext only (COA): E(K, m 1 ),...,E(K, m l ) K ICS 423: s known plaintext (KPA), chosen plaintext (CPA): m 1,...,m l, E(K, m 1 ),...,E(K, m l ) K chosen ciphertext (CCA): c 1,...,c l, D(K, c 1 ),...,D(K, c l ) K

38 Cryptanalytic attacks Asymmetric key attacks When k is publicly known ciphertext only (COA): k, E(k, m 1 ),...,E(k, m l ) k ICS 423: s known plaintext (KPA), chosen plaintext (CPA): k, m 1,...,m l, E(k, m 1 ),...,E(k, m l ) k chosen ciphertext (CCA): k, c 1,...,c l, D(k, c 1 ),...,D(k, c l ) k adaptive chosen ciphertext (CCA2):... (later!)

39 COA on monoalphabetic shift cipher ICS 423: s M =C=Z 26 K =Z 26 k = k = k E(k, m) = m+k mod 26 D(k, c) = c k mod 26

40 COA on monoalphabetic shift cipher ICS 423: s M =C=Z 26 K =Z 26 k = k = k E(k, m) = m+k mod 26 D(k, c) = c k mod 26 Idea Since there are just #K = 26 possible keys, simply try one after the other.

41 COA on monoalphabetic shift cipher ICS 423: s CY: N Y N X A J W D H T Q I c k m tx 1 : m x m w z i v c g s p h

42 COA on monoalphabetic shift cipher ICS 423: s CY: N Y N X A J W D H T Q I c k m tx 2 : l w l v y h u b f r o g

43 COA on monoalphabetic shift cipher ICS 423: s CY: N Y N X A J W D H T Q I c k m tx 5 : i t i s v e r y c o l d

44 COA on substitution cipher ICS 423: s M =C=Σ={a, b, c,...,z}, K = S(Σ) = the permutations of Σ k = k =σ E(σ, m) =σ(m) D(σ, c) =σ 1 (c)

45 COA on substitution cipher ICS 423: s M =C=Σ={a, b, c,...,z}, K = S(Σ) = the permutations of Σ k = k =σ E(σ, m) =σ(m) D(σ, c) =σ 1 (c) Fact Since #K = 26! , enumerating the keys and searching for a well-formed plaintext will not help.

46 COA on substitution cipher Idea Align the letter frequencies of plaintext (e.g. English)... ICS 423: s

47 COA on substitution cipher Idea Align the letter frequencies of plaintext (e.g. English)... ICS 423: s

48 COA on substitution cipher Idea... with the letter frequencies of the ciphertext ICS 423: s Q W D S E O G B K M A Z C P J L F U X R I Y V T H N

49 COA on substitution cipher ICS 423: s Result e t a o i n s h r d l c u Q W D S E O G B K M A Z C m w f g y p b v k j x q z P J L F U X R I Y V T H N

50 COA on substitution cipher ICS 423: s Result a b c d e f g h i j k l m D R Z M Q L F B E V Y A P n o p q r s t u v w x y z O S X H K G W C I J T U N

51 COA on substitution cipher overview ICS 423: s N plaintext m c ciphertext Σ M E =σ Σ C sampletext t µ t µ m µ c N [0, 1]

52 COA on substitution cipher overview ICS 423: s N plaintext m c ciphertext Σ M E =σ Σ C sampletext t D =σ µ t µ m µ c N [0, 1]

53 COA on substitution cipher overview ICS 423: s Summary The ciphertext c inducesµ c The sampletext t inducesµ t The plaintext m is assumed to haveµ m µ t The decryption D is induced by the lower triangle The upper triangle validates the correctness of D: Is D(c) a meaningful plaintext?

54 COA on transposition cipher ICS 423: s Plaintext all work and no play makes johnny a dull boy

55 COA on transposition cipher ICS 423: s Encryption a l l w o r k a n d n o p l a y m a k e s j o h n n y a d u l l b o y x

56 COA on transposition cipher ICS 423: s text AKPKNL LALENL LNASYB WDYJAO ONMODY ROAHUX

57 COA on transposition cipher ICS 423: s Anagramming

58 COA on transposition cipher ICS 423: s Anagramming

59 COA on transposition cipher overview ICS 423: s N C E =π N M ciphertext c m plaintext Σ sampletext t µ m =µ t N [0, 1]

60 COA on transposition cipher overview ICS 423: s N C E =π N M D =π ciphertext c m plaintext Σ sampletext t µ m =µ t N [0, 1]

61 COA on transposition cipher overview ICS 423: s Summary The sampletext t inducesµ t The plaintext m is assumed to haveµ m =µ t The decryptionπis built by maximizing iµ t c i π

62 COA depends on redundancy of language ICS 423: s The COA cryptanalysis is entirely based on the biases and the redundancy ofm: if all elements ofmare equally likely to occur, then substitution ciphers resist COA if all elements ofmare mutually independent (i.e. equally likely to occur with each other), then transposition ciphers resist COA

63 COA depends on redundancy of language ICS 423: s However, a uniformly distributedmis suboptimal for communication, and error prone without redundancy

64 COA depends on redundancy of language ICS 423: s However, a uniformly distributedmis suboptimal for communication, and error prone without redundancy there are KPAs.

65 KPA on the one-time-pad ICS 423: s M =C=K =Z N 26 E( k, m) = m+ k D( k, c) = c k

66 KPA on the one-time-pad ICS 423: s M =C=K =Z N 26 E( k, m) = m+ k D( k, c) = c k Attack Given m and E( k, m) = m+ k the cryptanalyst derives k = E( k, m) m

67 Can we prove that there are no attacks? ICS 423: s

68 Can we prove that there are no attacks? ICS 423: s Proposition If all keys are equally likely, then the one-time-pad is secure, in the sense that the ciphertext provides no information about the plaintext.

69 Can we prove that there are no attacks? ICS 423: s We need tools for such proofs!

70 Outline ICS 423: s s and crypto systems ciphers ciphers Breaking ciphers What did we learn?

71 What did we learn? ICS 423: s A cipher hides messages: S K = M E K C D K

72 What did we learn? A crypto system generates ciphers: ICS 423: s

73 What did we learn? ICS 423: s A substitution cipher permutes the text alphabet: M =C=Σ N, K = S(Σ) N K =σ E(σ, m) = σ 1 (m 1 ),σ 2 (m 2 ),...σ N (m N ) D(σ, c) = σ 1 1 (c 1),σ 1 2 (c 2),...σ 1 N (c N)

74 What did we learn? ICS 423: s A transposition cipher permutes the text positions: M =C=Σ N, K = S(N) = the permutations of the block positions K =σ E(σ, m) = m σ(1), m σ(2),...m σ(n) D(σ, c) = m σ 1 (1), m σ 1 (2),...m σ 1 (N)

75 What did we learn? A substitution cipher is cryptanalyzed by maximizing the frequency correlation between the plaintext and ciphtertext: ICS 423: s N plaintext m c ciphertext Σ M E =σ Σ C sampletext t D =σ µ t µ m µ c N [0, 1]

76 What did we learn? A transposition cipher is cryptanalyzing by maximizing the frequency correlations within the ciphertext: ICS 423: s N C E =π N M ciphertext c m plaintext Σ sampletext t µ m =µ t N [0, 1]

77 Way ahead ICS 423: s To count the frequencies and study the correlations, we need bits of probability and information theory.

CSCI3381-Cryptography

CSCI3381-Cryptography CSCI3381-Cryptography Lecture 2: Classical Cryptosystems September 3, 2014 This describes some cryptographic systems in use before the advent of computers. All of these methods are quite insecure, from

More information

Introduction to Cryptology. Lecture 2

Introduction to Cryptology. Lecture 2 Introduction to Cryptology Lecture 2 Announcements 2 nd vs. 1 st edition of textbook HW1 due Tuesday 2/9 Readings/quizzes (on Canvas) due Friday 2/12 Agenda Last time Historical ciphers and their cryptanalysis

More information

Introduction to Cryptography

Introduction to Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography EECE 412 1 Module Outline Historical background Classic ciphers One-time pad The Random Oracle model Random functions:

More information

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev Cryptography Lecture 2: Perfect Secrecy and its Limitations Gil Segev Last Week Symmetric-key encryption (KeyGen, Enc, Dec) Historical ciphers that are completely broken The basic principles of modern

More information

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3 Shift Cipher For 0 i 25, the ith plaintext character is shifted by some value 0 k 25 (mod 26). E.g. k = 3 a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y

More information

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m. Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show

More information

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3 Outline Computer Science 48 More on Perfect Secrecy, One-Time Pad, Mike Jacobson Department of Computer Science University of Calgary Week 3 2 3 Mike Jacobson (University of Calgary) Computer Science 48

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice

More information

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography Topic 2 1 Lecture Outline Basics of probability Vigenere cipher. Attacks on Vigenere: Kasisky Test and Index of Coincidence Cipher machines:

More information

Cook-Levin Theorem. SAT is NP-complete

Cook-Levin Theorem. SAT is NP-complete Cook-Levin Theorem SAT is NP-complete In other words SAT NP A NP A P SAT 1 Consider any A NP NTM N that decides A in polytime n k For any input w Σ * valid tableau of configurations 2 Properties of an

More information

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018 THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018 CPSC 418/MATH 318 L01 October 17, 2018 Time: 50 minutes

More information

Polyalphabetic Ciphers

Polyalphabetic Ciphers Polyalphabetic Ciphers 1 Basic Idea: The substitution alphabet used for enciphering successive letters of plaintext changes. The selection of alphabets may depend on a keyword, a key stream, or electromechanical

More information

monoalphabetic cryptanalysis Character Frequencies (English) Security in Computing Common English Digrams and Trigrams Chapter 2

monoalphabetic cryptanalysis Character Frequencies (English) Security in Computing Common English Digrams and Trigrams Chapter 2 Common English Digrams and Trigrams Digrams EN RE ER NT TH ON IN TF AN OR Trigrams ENT ION AND ING IVE TIO FOR OUR THI ONE monoalphabetic cryptanalysis See class example Pfleeger, Security in Computing,

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 22, 2013 CPSC 467b, Lecture 3 1/35 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine

More information

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268 ò{çd@àt ø 2005.0.3. Suppose the plaintext alphabets include a z, A Z, 0 9, and the space character, therefore, we work on 63 instead of 26 for an affine cipher. How many keys are possible? What if we add

More information

Outline. CPSC 418/MATH 318 Introduction to Cryptography. Information Theory. Partial Information. Perfect Secrecy, One-Time Pad

Outline. CPSC 418/MATH 318 Introduction to Cryptography. Information Theory. Partial Information. Perfect Secrecy, One-Time Pad Outline CPSC 418/MATH 318 Introduction to Cryptography, One-Time Pad Renate Scheidler Department of Mathematics & Statistics Department of Computer Science University of Calgary Based in part on slides

More information

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc.

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc. Innovation and Cryptoventures Cryptology Campbell R. Harvey Duke University, NBER and Investment Strategy Advisor, Man Group, plc January 20, 2017 Overview Cryptology Cryptography Cryptanalysis Symmetric

More information

... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc.

... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc. Assignment 3 - Cryptography Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc. Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M.

More information

Chapter 2 : Perfectly-Secret Encryption

Chapter 2 : Perfectly-Secret Encryption COMP547 Claude Crépeau INTRODUCTION TO MODERN CRYPTOGRAPHY _ Second Edition _ Jonathan Katz Yehuda Lindell Chapter 2 : Perfectly-Secret Encryption 1 2.1 Definitions and Basic Properties We refer to probability

More information

5. Classical Cryptographic Techniques from modular arithmetic perspective

5. Classical Cryptographic Techniques from modular arithmetic perspective . Classical Cryptographic Techniques from modular arithmetic perspective By classical cryptography we mean methods of encipherment that have been used from antiquity through the middle of the twentieth

More information

CS 6260 Applied Cryptography

CS 6260 Applied Cryptography CS 6260 Applied Cryptography Symmetric encryption schemes A scheme is specified by a key generation algorithm K, an encryption algorithm E, and a decryption algorithm D. K K =(K,E,D) MsgSp-message space

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-22 Recap Two methods for attacking the Vigenère cipher Frequency analysis Dot Product Playfair Cipher Classical Cryptosystems - Section

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously on COS 433 Pre- modern Cryptography 1900 B.C. mid 1900 s A.D With few exceptions, synonymous with encryption c = Enc(k,m)

More information

Chapter 2 Classical Cryptosystems

Chapter 2 Classical Cryptosystems Chapter 2 Classical Cryptosystems Note We will use the convention that plaintext will be lowercase and ciphertext will be in all capitals. 2.1 Shift Ciphers The idea of the Caesar cipher: To encrypt, shift

More information

CLASSICAL ENCRYPTION. Mihir Bellare UCSD 1

CLASSICAL ENCRYPTION. Mihir Bellare UCSD 1 CLASSICAL ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric encryption scheme SE = (K, E, D) consists of three algorithms: (Adversary) Mihir Bellare UCSD 2 Correct decryption requirement For all K, M

More information

Sound approaches to cryptography

Sound approaches to cryptography CHAPTER 4: CLASSICAL (SECRET-KEY) CRYPTOSYSTEMS Part IV Secret-key cryptosystems In this chapter we deal with some of the very old, or quite old, classical (secret-key or symmetric) cryptosystems that

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

Lecture 8 - Cryptography and Information Theory

Lecture 8 - Cryptography and Information Theory Lecture 8 - Cryptography and Information Theory Jan Bouda FI MU April 22, 2010 Jan Bouda (FI MU) Lecture 8 - Cryptography and Information Theory April 22, 2010 1 / 25 Part I Cryptosystem Jan Bouda (FI

More information

Efficient Cryptanalysis of Homophonic Substitution Ciphers

Efficient Cryptanalysis of Homophonic Substitution Ciphers Efficient Cryptanalysis of Homophonic Substitution Ciphers Amrapali Dhavare Richard M. Low Mark Stamp Abstract Substitution ciphers are among the earliest methods of encryption. Examples of classic substitution

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 08 Shannon s Theory (Contd.)

More information

Security of Networks (12) Exercises

Security of Networks (12) Exercises (12) Exercises 1.1 Below are given four examples of ciphertext, one obtained from a Substitution Cipher, one from a Vigenere Cipher, one from an Affine Cipher, and one unspecified. In each case, the task

More information

Great Theoretical Ideas in Computer Science

Great Theoretical Ideas in Computer Science 15-251 Great Theoretical Ideas in Computer Science Lecture 22: Cryptography November 12th, 2015 What is cryptography about? Adversary Eavesdropper I will cut your throat I will cut your throat What is

More information

Solution to Midterm Examination

Solution to Midterm Examination YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Handout #13 Xueyuan Su November 4, 2008 Instructions: Solution to Midterm Examination This is a closed book

More information

CS 6260 Applied Cryptography

CS 6260 Applied Cryptography CS 6260 Applied Cryptography Alexandra (Sasha) Boldyreva Symmetric encryption, encryption modes, security notions. 1 Symmetric encryption schemes A scheme is specified by a key generation algorithm K,

More information

Chapter 2. A Look Back. 2.1 Substitution ciphers

Chapter 2. A Look Back. 2.1 Substitution ciphers Chapter 2 A Look Back In this chapter we take a quick look at some classical encryption techniques, illustrating their weakness and using these examples to initiate questions about how to define privacy.

More information

Lecture 12: Block ciphers

Lecture 12: Block ciphers Lecture 12: Block ciphers Thomas Johansson T. Johansson (Lund University) 1 / 19 Block ciphers A block cipher encrypts a block of plaintext bits x to a block of ciphertext bits y. The transformation is

More information

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above. 1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above. Directions: You have 75 minutes in which to complete this exam. Please make sure that you read through this entire exam before

More information

Division Property: a New Attack Against Block Ciphers

Division Property: a New Attack Against Block Ciphers Division Property: a New Attack Against Block Ciphers Christina Boura (joint on-going work with Anne Canteaut) Séminaire du groupe Algèbre et Géometrie, LMV November 24, 2015 1 / 50 Symmetric-key encryption

More information

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Solutions for week 1, Cryptography Course - TDA 352/DIT 250 Solutions for week, Cryptography Course - TDA 352/DIT 250 In this weekly exercise sheet: you will use some historical ciphers, the OTP, the definition of semantic security and some combinatorial problems.

More information

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment. CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1

More information

Simple Codes MTH 440

Simple Codes MTH 440 Simple Codes MTH 440 Not all codes are for the purpose of secrecy Morse Code ASCII Zip codes Area codes Library book codes Credit Cards ASCII Code Steganography: Hidden in plain sight (example from http://www.bbc.co.uk/news/10

More information

2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm.

2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm. CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES ANSWERS TO QUESTIONS 2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm. 2.2 Permutation and substitution. 2.3 One key for symmetric

More information

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009) Make sure that this examination has 10 numbered pages University of Regina Department of Mathematics & Statistics Final Examination 200910 (April 21, 2009) Mathematics 124 The Art and Science of Secret

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

Polyalphabetic Substitutions

Polyalphabetic Substitutions Polyalphabetic Substitutions Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D-55099 Mainz October 25, 1999 English version October 13, 2013

More information

CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT

CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT 82 CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT 83 5.1 Introduction In a pioneering paper, Hill [5] developed a block cipher by using the modular arithmetic inverse

More information

Classic Cryptography Tutorial. c Eli Biham - May 3, Classic Cryptography Tutorial (3)

Classic Cryptography Tutorial. c Eli Biham - May 3, Classic Cryptography Tutorial (3) Classic Cryptography Tutorial c Eli Biham - May 3, 2005 68 Classic Cryptography Tutorial (3) Ciphertext-Only Attack on Substitution Cipher Monoalphabetic substitution ciphers cannot protect against known

More information

About Vigenere cipher modifications

About Vigenere cipher modifications Proceedings of the Workshop on Foundations of Informatics FOI-2015, August 24-29, 2015, Chisinau, Republic of Moldova About Vigenere cipher modifications Eugene Kuznetsov Abstract TheaimofthisworkisamodificationoftheclassicalVigenere

More information

Shannon s Theory of Secrecy Systems

Shannon s Theory of Secrecy Systems Shannon s Theory of Secrecy Systems See: C. E. Shannon, Communication Theory of Secrecy Systems, Bell Systems Technical Journal, Vol. 28, pp. 656 715, 1948. c Eli Biham - March 1, 2011 59 Shannon s Theory

More information

CPA-Security. Definition: A private-key encryption scheme

CPA-Security. Definition: A private-key encryption scheme CPA-Security The CPA Indistinguishability Experiment PrivK cpa A,Π n : 1. A key k is generated by running Gen 1 n. 2. The adversary A is given input 1 n and oracle access to Enc k, and outputs a pair of

More information

What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL

What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL Definition: Cryptosystem Cryptography means secret writing and it is the art of concealing meaning. A Cryptosystem is a 5-tuple(E, D,M,K,C),

More information

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above. 1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above. Directions: You have 50 minutes in which to complete this exam. Please make sure that you read through this entire exam before

More information

Public Key Cryptography

Public Key Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Public Key Cryptography EECE 412 1 What is it? Two keys Sender uses recipient s public key to encrypt Receiver uses his private key to decrypt

More information

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used. UNIVERSITY OF EAST ANGLIA School of Mathematics May/June UG Examination 2010 2011 CRYPTOGRAPHY Time allowed: 2 hours Attempt THREE questions. Candidates must show on each answer book the type of calculator

More information

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS CIS 400/628 Spring 2005 Introduction to Cryptography This is based on Chapter 1 of Lewand and Chapter 1 of Garrett. MONOALPHABETIC SUBSTITUTION CIPHERS These

More information

Lecture (04) Classical Encryption Techniques (III)

Lecture (04) Classical Encryption Techniques (III) Lecture (04) Classical Encryption Techniques (III) Dr. Ahmed M. ElShafee ١ Playfair Cipher one approach to improve security was to encrypt multiple letters the Playfair Cipher is an example invented by

More information

one approach to improve security was to encrypt multiple letters invented by Charles Wheatstone in 1854, but named after his

one approach to improve security was to encrypt multiple letters invented by Charles Wheatstone in 1854, but named after his Lecture (04) Classical Encryption Techniques (III) Dr. Ahmed M. ElShafee ١ The rules for filling in this 5x5 matrix are: L to R, top to bottom, first with keyword after duplicate letters have been removed,

More information

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

Written examination. Tuesday, August 18, 2015, 08:30 a.m. Advanced Methods of Cryptography Univ.-Prof. Dr. rer. nat. Rudolf Mathar 1 2 3 4 19 20 11 20 70 Written examination Tuesday, August 18, 2015, 08:30 a.m. Name: Matr.-No.: Field of study: Please pay attention

More information

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM VORA,VRUSHANK APPRENTICE PROGRAM Abstract. This paper will analyze the strengths and weaknesses of the underlying computational

More information

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1 SYMMETRIC ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric encryption scheme SE = (K, E, D) consists of three algorithms: K and E may be randomized, but D must be deterministic. Mihir Bellare UCSD 2

More information

Linear Ciphers. Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D Mainz

Linear Ciphers. Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D Mainz Linear Ciphers Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D-55099 Mainz January 16, 2000 English version July 28, 2014 last change August

More information

Practice Exam Winter 2018, CS 485/585 Crypto March 14, 2018

Practice Exam Winter 2018, CS 485/585 Crypto March 14, 2018 Practice Exam Name: Winter 2018, CS 485/585 Crypto March 14, 2018 Portland State University Prof. Fang Song Instructions This exam contains 8 pages (including this cover page) and 5 questions. Total of

More information

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and )

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and ) A Better Cipher The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and ) To the first letter, add 1 To the second letter, add 14 To the third

More information

Problem 1. k zero bits. n bits. Block Cipher. Block Cipher. Block Cipher. Block Cipher. removed

Problem 1. k zero bits. n bits. Block Cipher. Block Cipher. Block Cipher. Block Cipher. removed Problem 1 n bits k zero bits IV Block Block Block Block removed January 27, 2011 Practical Aspects of Modern Cryptography 2 Problem 1 IV Inverse Inverse Inverse Inverse Missing bits January 27, 2011 Practical

More information

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9. ( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use

More information

Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2

Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2 0368.3049.01 Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod Assignment #2 Published Sunday, February 17, 2008 and very slightly revised Feb. 18. Due Tues., March 4, in Rani Hod

More information

AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY

AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY ! """#$# AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY *Kallam Ravindra Babu 1, Dr. S. Udaya Kumar 2, Dr. A. Vinaya Babu 3 and Dr. M. Thirupathi Reddy 4 1 Research Scholar (JNTUH),

More information

Block ciphers And modes of operation. Table of contents

Block ciphers And modes of operation. Table of contents Block ciphers And modes of operation Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction Pseudorandom permutations Block Ciphers Modes of Operation

More information

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4 CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky Lecture 4 Lecture date: January 26, 2005 Scribe: Paul Ray, Mike Welch, Fernando Pereira 1 Private Key Encryption Consider a game between

More information

Notes for Lecture 9. 1 Combining Encryption and Authentication

Notes for Lecture 9. 1 Combining Encryption and Authentication U.C. Berkeley CS276: Cryptography Handout N9 Luca Trevisan February 17, 2009 Notes for Lecture 9 Notes scribed by Joel Weinberger, posted March 1, 2009 Summary Last time, we showed that combining a CPA-secure

More information

Cryptography - Session 2

Cryptography - Session 2 Cryptography - Session 2 O. Geil, Aalborg University November 18, 2010 Random variables Discrete random variable X: 1. Probability distribution on finite set X. 2. For x X write Pr(x) = Pr(X = x). X and

More information

Cryptography and Secure Communication Protocols

Cryptography and Secure Communication Protocols Cryptography and Secure Communication Protocols Jayadev Misra The University of Texas at Austin October 1, 2003 Contents 1 Introduction 1 2 Early Encryption Schemes 2 2.1 Substitution cyphers.........................

More information

Jay Daigle Occidental College Math 401: Cryptology

Jay Daigle Occidental College Math 401: Cryptology 3 Block Ciphers Every encryption method we ve studied so far has been a substitution cipher: that is, each letter is replaced by exactly one other letter. In fact, we ve studied stream ciphers, which produce

More information

Solution of Exercise Sheet 7

Solution of Exercise Sheet 7 saarland Foundations of Cybersecurity (Winter 16/17) Prof. Dr. Michael Backes CISPA / Saarland University university computer science Solution of Exercise Sheet 7 1 Variants of Modes of Operation Let (K,

More information

Historical cryptography

Historical cryptography Historical cryptography Alice Bob Eve CSCI 470: Web Science Keith Vertanen Overview Historical cryptography Monoalphabetic substitution ciphers Breaking them Some improvements The cipher of Mary Queen

More information

Cryptography 2017 Lecture 2

Cryptography 2017 Lecture 2 Cryptography 2017 Lecture 2 One Time Pad - Perfect Secrecy Stream Ciphers November 3, 2017 1 / 39 What have seen? What are we discussing today? Lecture 1 Course Intro Historical Ciphers Lecture 2 One Time

More information

Cryptography. pieces from work by Gordon Royle

Cryptography. pieces from work by Gordon Royle Cryptography pieces from work by Gordon Royle The set-up Cryptography is the mathematics of devising secure communication systems, whereas cryptanalysis is the mathematics of breaking such systems. We

More information

Models and analysis of security protocols 1st Semester Symmetric Encryption Lecture 5

Models and analysis of security protocols 1st Semester Symmetric Encryption Lecture 5 Models and analysis of security protocols 1st Semester 2009-2010 Symmetric Encryption Lecture 5 Pascal Lafourcade Université Joseph Fourier, Verimag Master: September 29th 2009 1 / 60 Last Time (I) Security

More information

Video intypedia001en EXERCISES

Video intypedia001en EXERCISES Video intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE EXERCISES Dr. Arturo Ribagorda Garnacho, Carlos III University of Madrid, Spain. EXERCISE 1 The discovery that in each

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics 2011 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood

More information

Lecture Note 3 Date:

Lecture Note 3 Date: P.Lafourcade Lecture Note 3 Date: 28.09.2009 Security models 1st Semester 2007/2008 ROUAULT Boris GABIAM Amanda ARNEDO Pedro 1 Contents 1 Perfect Encryption 3 1.1 Notations....................................

More information

Using Matrices for Cryptography

Using Matrices for Cryptography Using Matrices for Cryptography In the newspaper, usually on the comics page, there will be a puzzle that looks similar to this: BRJDJ WT X BWUJ AHD PJYXDBODJ JQJV ZRJV GRJDJ T VH EJDBXWV YSXEJ BH FH 1

More information

Classical Cryptography

Classical Cryptography JASS 05 Seminar: Algorithms for IT Security Classical Cryptography Ilya Saverchenko June 6, 2005 Abstract Cryptography is a study of secret writing. It allows two people, usually referred to as Alice and

More information

Topics. Probability Theory. Perfect Secrecy. Information Theory

Topics. Probability Theory. Perfect Secrecy. Information Theory Topics Probability Theory Perfect Secrecy Information Theory Some Terms (P,C,K,E,D) Computational Security Computational effort required to break cryptosystem Provable Security Relative to another, difficult

More information

Exercise Sheet Cryptography 1, 2011

Exercise Sheet Cryptography 1, 2011 Cryptography 1 http://www.cs.ut.ee/~unruh/crypto1-11/ Exercise Sheet Cryptography 1, 2011 Exercise 1 DES The Data Encryption Standard (DES) is a very famous and widely used block cipher. It maps 64-bit

More information

Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R)

Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R) Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R) Eli Biham Computer Science Department Technion Israel Institute of Technology Haifa 32000, Israel biham@cs.technion.ac.il http://www.cs.technion.ac.il/~biham/

More information

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 5

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 5 COMM1003 Information Theory Dr. Wassim Alexan Spring 2018 Lecture 5 The Baconian Cipher A mono alphabetic cipher invented by Sir Francis Bacon In this cipher, each letter is replaced by a sequence of five

More information

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER 177 CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER 178 12.1 Introduction The study of cryptography of gray level images [110, 112, 118] by using block ciphers has gained considerable

More information

A block cipher enciphers each block with the same key.

A block cipher enciphers each block with the same key. Ciphers are classified as block or stream ciphers. All ciphers split long messages into blocks and encipher each block separately. Block sizes range from one bit to thousands of bits per block. A block

More information

Implementation Tutorial on RSA

Implementation Tutorial on RSA Implementation Tutorial on Maciek Adamczyk; m adamczyk@umail.ucsb.edu Marianne Magnussen; mariannemagnussen@umail.ucsb.edu Adamczyk and Magnussen Spring 2018 1 / 13 Overview Implementation Tutorial Introduction

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously on COS 433 Takeaway: Crypto is Hard Designing crypto is hard, even experts get it wrong Just because I don t know

More information

Chapter 11 : Private-Key Encryption

Chapter 11 : Private-Key Encryption COMP547 Claude Crépeau INTRODUCTION TO MODERN CRYPTOGRAPHY _ Second Edition _ Jonathan Katz Yehuda Lindell Chapter 11 : Private-Key Encryption 1 Chapter 11 Public-Key Encryption Apologies: all numbering

More information

Public Key Encryption

Public Key Encryption Public Key Encryption KG October 17, 2017 Contents 1 Introduction 1 2 Public Key Encryption 2 3 Schemes Based on Diffie-Hellman 3 3.1 ElGamal.................................... 5 4 RSA 7 4.1 Preliminaries.................................

More information

On some properties of PRNGs based on block ciphers in counter mode

On some properties of PRNGs based on block ciphers in counter mode On some properties of PRNGs based on block ciphers in counter mode Alexey Urivskiy, Andrey Rybkin, Mikhail Borodin JSC InfoTeCS, Moscow, Russia alexey.urivskiy@mail.ru 2016 Pseudo Random Number Generators

More information

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6 U.C. Berkeley CS276: Cryptography Handout N6 Luca Trevisan February 5, 2009 Notes for Lecture 6 Scribed by Ian Haken, posted February 8, 2009 Summary The encryption scheme we saw last time, based on pseudorandom

More information

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY BURTON ROSENBERG UNIVERSITY OF MIAMI Contents 1. Perfect Secrecy 1 1.1. A Perfectly Secret Cipher 2 1.2. Odds Ratio and Bias 3 1.3. Conditions for Perfect

More information

Modern Cryptography Lecture 4

Modern Cryptography Lecture 4 Modern Cryptography Lecture 4 Pseudorandom Functions Block-Ciphers Modes of Operation Chosen-Ciphertext Security 1 October 30th, 2018 2 Webpage Page for first part, Homeworks, Slides http://pub.ist.ac.at/crypto/moderncrypto18.html

More information

Introduction to Cybersecurity Cryptography (Part 5)

Introduction to Cybersecurity Cryptography (Part 5) Introduction to Cybersecurity Cryptography (Part 5) Prof. Dr. Michael Backes 13.01.2017 February 17 th Special Lecture! 45 Minutes Your Choice 1. Automotive Security 2. Smartphone Security 3. Side Channel

More information