Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.

Slides:



Advertisements
Similar presentations
ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
Advertisements

1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
CIS 5371 Cryptography 3b. Pseudorandomness.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Foundations of Cryptography Lecture 5: Signatures and pseudo-random generators Lecturer: Moni Naor.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Introduction to Modern Cryptography Homework assignments.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
Lecturer: Moni Naor Weizmann Institute of Science
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Computer Security CS 426 Lecture 3
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Cryptography Lecture 8 Stefan Dziembowski
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Broadcast Encryption Amos Fiat & Moni Naor Presented.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Lecture 9 Stefan Dziembowski
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Cryptography Lecture 2 Stefan Dziembowski
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 CIS 5371 Cryptography 5a. Pseudorandom Objects in Practice Block Ciphers B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
1 Hash Functions. 2 A hash function h takes as input a message of arbitrary length and produces as output a message digest of fixed length
Lecture 2: Introduction to Cryptography
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
Midterm Statistics Minimum Value 56.1 Maximum Value 93.8 Range 37.7
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Cryptography Lecture 5.
B504/I538: Introduction to Cryptography
Introduction to Modern Cryptography, Lecture 15
Cryptography Lecture 5.
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
Presentation transcript:

Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking

Broadcast Encryption Transmit a message securely to a subset of a (large) user group. Introduce a resiliency measure, t, how many users can jointly break the system? Solution 1: Every user is missing a symmetric key, XOR the keys of the omitted users. This is 1-resilient. Alternately, use a tree like hash structure to reduce memory requirements per user Alternately, use a Diffie-Hellman like 1- resilient Scheme

Increasing the resiliency Assign the users to vertices of a hypercube. Transmit a message to the chosen group by transmitting 2 log n messages, 2 messages per coordinate. Every set of two users will be split by one of the partitions. This increases the resiliency to 2. Use a recursive construction to get resiliency t.

Randomized Constructions Allow randomization in the construction of the scheme For example, toss the users into t 2 bins. With constant probability a given set of size t will be split entirely. Many other solutions.

Traitor Tracing Imagine that the TV decoder is set to decrypt some data. A pirated version of the decoder should allow us to recognize the decoder copied. Simple solution: 2 log n keys in total, every decoder gets log n keys.

The idea behind TT schemes: Make it infeasible to construct an “ unrecognizable ” decoder from a set of legal decoders.

Weak One-Way Functions A function f:{0,1} *  {0,1} * is called weakly one way if the following hold: –Easy to compute f in polynomial time –Slightly hard to invert: there exists a positive polynomial p(), such that for every probabilistic polynomial time algorithm A ’, and all sufficiently large n ’ s:

Weak One-way functions imply strong one-way functions f is a weak one way function, and p() is the polynomial such that for every probabilistic polynomial time algorithm A ’, and all sufficiently large n ’ s:

Weak One-way functions imply strong one-way functions f is a weak one way function, let p() be the polynomial for which we define t(n)=n p(n) and define g as follows: Inverting g on g(y 1,y 2, …, y t(n) ) involves finding f --1 (y j )

Weak One-way functions imply strong one-way functions f is a weak one way function, we want to argue that g is a strong one way function. Alternately, we will show that if g is not a strong one way function, then f is not a weak one way function.

Weak One-way functions imply strong one-way functions if g is not a strong one way function: there exists a probabilistic polynomial time algorithm B ’ and a polynomial q() such that for infinitely many m ’ s:

Weak One-way functions imply strong one-way functions Using B ’, we now show that f is not weakly one way, one input y, n=|y|: Repeat a(n)=2n 2 q(n 2 p(n)) times: for i=1 to t(n) do select x 1, …, x t(n) from U n replace the i ’ th x with y feed the conactenated x i ’ s to B ’ check if f -1 (y) was computed

Hard core predicates f is one-way does not say that we cannot learn some partial information about f -1 (y) A polynomial time computable predicate b:{0,1} *  {0,1} * is called a hard core of a function f if for every probabilistic polynomial time algorithm A ’, every positive polynomial p(), and all sufficiently large n ’ s:

Hard core predicates for any one way function Let f be an arbitrary one-way function, and let g be defined by g(x,r) = f(x) || r. Let b(x,r) denote the inner product of the binary vectors x and r, then b is a hard core for the function g. Generalization: hard core functions (indistinguishable)

Psuedorandom generators Let f be a length preserving 1-1 strongly one way function, and let b a hard core predicate for f. Then The seqeunce (b(s), b(f(s)), b(f(f(s)), … is psuedorandom

What does this mean? You assume that AES is weakly one way: –You want a provably psuedorandom sequence for stream encryption. –You start by producing a strongly one way function which involves polynomially many applications of AES –You take the total output and xor it with a random string r, this gives you one bit of your stream –You then apply the strong one way function again, and repeat. –This is very expensive (obviously), but then, it suffices that AES be only weakly one way for you to be safe.