Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.

Slides:



Advertisements
Similar presentations
Computational Analogues of Entropy Boaz Barak Ronen Shaltiel Avi Wigderson.
Advertisements

Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
ElGamal Security Public key encryption from Diffie-Hellman
Dan Boneh Using block ciphers Modes of operation: one time key Online Cryptography Course Dan Boneh example: encrypted , new key for every message.
Trusted 3rd parties Basic key exchange
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Online Cryptography Course Dan Boneh
Dan Boneh Stream ciphers Real-world Stream Ciphers Online Cryptography Course Dan Boneh.
CS151 Complexity Theory Lecture 8 April 22, 2004.
CIS 5371 Cryptography 3b. Pseudorandomness.
Cryptography: The Landscape, Fundamental Primitives, and Security David Brumley Carnegie Mellon University.
Dan Boneh Message Integrity A Parallel MAC Online Cryptography Course Dan Boneh.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
The Bright Side of Hardness Relating Computational Complexity and Cryptography Oded Goldreich Weizmann Institute of Science.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
Computational Indistinguishability “To suppose two things indiscernible is to suppose the same thing under two different names” Gottfried Wilhelm Leibniz.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 2: Perfect Secrecy.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Dan Boneh Collision resistance Generic birthday attack Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange The Diffie-Hellman protocol Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Public-key encryption Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations The RSA trapdoor permutation Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Dan Boneh Block ciphers The data encryption standard (DES) Online Cryptography Course Dan Boneh.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Dan Boneh Authenticated Encryption Definitions Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Key Derivation Online Cryptography Course Dan Boneh.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Dan Boneh Odds and ends Format preserving encryption Online Cryptography Course Dan Boneh.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Dan Boneh Block ciphers More attacks on block ciphers Online Cryptography Course Dan Boneh.
Dan Boneh Public Key Encryption from trapdoor permutations Is RSA a one-way function? Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Discrete Probability (crash course) Online Cryptography Course Dan Boneh See also:
Dan Boneh Introduction Discrete Probability (crash course) Online Cryptography Course Dan Boneh.
Attacks on OTP and stream ciphers
Dan Boneh Public Key Encryption from trapdoor permutations PKCS 1 Online Cryptography Course Dan Boneh.
Dan Boneh Using block ciphers Modes of operation: many time key (CBC) Online Cryptography Course Dan Boneh Example applications: 1. File systems: Same.
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Dan Boneh Collision resistance Introduction Online Cryptography Course Dan Boneh.
Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh.
Dan Boneh Message Integrity CBC-MAC and NMAC Online Cryptography Course Dan Boneh.
Cryptography: The Landscape, Fundamental Primitives, and Security David Brumley Carnegie Mellon University.
Odds and ends Tweakable encryption
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Dan Boneh Stream ciphers Stream ciphers are semantically secure Online Cryptography Course Dan Boneh Goal: secure PRG ⇒ semantically secure stream cipher.
Dan Boneh Collision resistance The Merkle-Damgard Paradigm Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.
Dan Boneh Intro. Number Theory Arithmetic algorithms Online Cryptography Course Dan Boneh.
Dan Boneh Odds and ends Deterministic Encryption Online Cryptography Course Dan Boneh.
Block ciphers What is a block cipher?
Dan Boneh Introduction Discrete Probability (crash course, cont.) Online Cryptography Course Dan Boneh See also:
Dan Boneh Public Key Encryption from trapdoor permutations Constructions Online Cryptography Course Dan Boneh Goal: construct chosen-ciphertext secure.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Secrecy of (fixed-length) stream ciphers
B504/I538: Introduction to Cryptography
Topic 5: Constructing Secure Encryption Schemes
Cryptography Lecture 6.
Topic 7: Pseudorandom Functions and CPA-Security
B504/I538: Introduction to Cryptography
B504/I538: Introduction to Cryptography
Cryptography Lecture 8.
Cryptography Lecture 6.
Presentation transcript:

Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh

Dan Boneh Let G:K {0,1} n be a PRG Goal: define what it means that is “indistinguishable” from

Dan Boneh Statistical Tests Statistical test on {0,1} n : an alg. A s.t. A ( x ) outputs “0” or “1” Examples:

Dan Boneh Statistical Tests More examples:

Dan Boneh Advantage Let G:K {0,1} n be a PRG and A a stat. test on {0,1} n Define: A silly example: A(x) = 0 ⇒ Adv PRG [A,G] = 0

Dan Boneh Suppose G:K {0,1} n satisfies msb(G(k)) = 1 for 2/3 of keys in K Define stat. test A ( x ) as: if [ msb(x)=1 ] output “1” else output “0” Then Adv PRG [A,G] = | Pr[ A(G(k))=1] - Pr[ A(r)=1 ] | = | 2/3 – 1/2 | = 1/6

Dan Boneh Secure PRGs: crypto definition Def: We say that G:K {0,1} n is a secure PRG if Are there provably secure PRGs? but we have heuristic candidates.

Dan Boneh Easy fact: a secure PRG is unpredictable We show: PRG predictable ⇒ PRG is insecure Suppose A is an efficient algorithm s.t. for non-negligible ε (e.g. ε = 1/1000)

Dan Boneh Easy fact: a secure PRG is unpredictable Define statistical test B as:

Dan Boneh Thm (Yao’82) : an unpredictable PRG is secure Let G:K {0,1} n be PRG “Thm”: if ∀ i ∈ {0, …, n-1} PRG G is unpredictable at pos. i then G is a secure PRG. If next-bit predictors cannot distinguish G from random then no statistical test can !!

Template vertLeftWhite2 Let G:K {0,1} n be a PRG such that from the last n/2 bits of G(k) it is easy to compute the first n/2 bits. Is G predictable for some i ∈ {0, …, n-1} ? Yes No

Dan Boneh More Generally Let P 1 and P 2 be two distributions over {0,1} n Def: We say that P 1 and P 2 are computationally indistinguishable (denoted ) Example: a PRG is secure if { k K : G(k) } ≈ p uniform ( {0,1} n ) R

Dan Boneh End of Segment