Podcast
Questions and Answers
What transformation did cryptography undergo from the mid-20th century to today?
What transformation did cryptography undergo from the mid-20th century to today?
Cryptography evolved from a practice limited to writing and solving codes into a scientific discipline encompassing various applications like authentication and key exchange.
List two applications of cryptography beyond simple encryption.
List two applications of cryptography beyond simple encryption.
Authentication and key exchange are two key applications of cryptography beyond simple encryption.
Define what constitutes an encryption scheme.
Define what constitutes an encryption scheme.
An encryption scheme consists of a method for converting plaintext into ciphertext using a specific algorithm and key for secure communication.
What were the primary users of cryptography before the mid-20th century?
What were the primary users of cryptography before the mid-20th century?
Signup and view all the answers
Explain the significance of Yao's millionaire problem in contemporary cryptography.
Explain the significance of Yao's millionaire problem in contemporary cryptography.
Signup and view all the answers
What is the significance of the statement Pr[M = m|C = c] = Pr[M = m] in the context of perfect encryption?
What is the significance of the statement Pr[M = m|C = c] = Pr[M = m] in the context of perfect encryption?
Signup and view all the answers
How does perfect encryption ensure that every message has an equal probability distribution over messages?
How does perfect encryption ensure that every message has an equal probability distribution over messages?
Signup and view all the answers
Explain the role of Bayes' theorem in the proof of equivalence for perfect encryption.
Explain the role of Bayes' theorem in the proof of equivalence for perfect encryption.
Signup and view all the answers
In perfect encryption, why is it crucial that Pr[C = c|M = m] = Pr[C = c] holds for all messages m and ciphertexts c?
In perfect encryption, why is it crucial that Pr[C = c|M = m] = Pr[C = c] holds for all messages m and ciphertexts c?
Signup and view all the answers
What implications does having a probability distribution over messages (Pr[M = m]) have on the encryption process in perfect encryption?
What implications does having a probability distribution over messages (Pr[M = m]) have on the encryption process in perfect encryption?
Signup and view all the answers
What is the essence of Kerckhoffs’ principle?
What is the essence of Kerckhoffs’ principle?
Signup and view all the answers
Why is it more manageable to keep only the key secret according to Kerckhoffs' principle?
Why is it more manageable to keep only the key secret according to Kerckhoffs' principle?
Signup and view all the answers
How does the use of public algorithms enhance security?
How does the use of public algorithms enhance security?
Signup and view all the answers
What are the four attack scenarios described in the context of cryptanalysis?
What are the four attack scenarios described in the context of cryptanalysis?
Signup and view all the answers
What is a simple method to break Caesar's cipher when only the ciphertext is known?
What is a simple method to break Caesar's cipher when only the ciphertext is known?
Signup and view all the answers
What lesson can be learned about key space from the analysis of Caesar's cipher?
What lesson can be learned about key space from the analysis of Caesar's cipher?
Signup and view all the answers
In what way does Kerckhoffs’ principle suggest avoiding risks associated with code reverse-engineering?
In what way does Kerckhoffs’ principle suggest avoiding risks associated with code reverse-engineering?
Signup and view all the answers
Why is having a single encryption scheme per pair of users considered unmanageable?
Why is having a single encryption scheme per pair of users considered unmanageable?
Signup and view all the answers
What is the primary improvement of mono-alphabetic substitution over Caesar's cipher?
What is the primary improvement of mono-alphabetic substitution over Caesar's cipher?
Signup and view all the answers
How many possible keys are there in a mono-alphabetic substitution cipher?
How many possible keys are there in a mono-alphabetic substitution cipher?
Signup and view all the answers
What cryptanalysis method can be used to break a mono-alphabetic substitution cipher?
What cryptanalysis method can be used to break a mono-alphabetic substitution cipher?
Signup and view all the answers
What lesson is learned about key space from the vulnerabilities of mono-alphabetic ciphers?
What lesson is learned about key space from the vulnerabilities of mono-alphabetic ciphers?
Signup and view all the answers
Describe the unique feature of the Vigenère cipher compared to previous ciphers.
Describe the unique feature of the Vigenère cipher compared to previous ciphers.
Signup and view all the answers
What hypothetical key could you use to encode 'Cryptography is great' in a Vigenère cipher, if the key is ⟨2, 24, 5⟩?
What hypothetical key could you use to encode 'Cryptography is great' in a Vigenère cipher, if the key is ⟨2, 24, 5⟩?
Signup and view all the answers
What can help to break the Vigenère cipher, given sufficient ciphertext?
What can help to break the Vigenère cipher, given sufficient ciphertext?
Signup and view all the answers
Why is large key space not enough for secure encryption according to the discussions on mono-alphabetic ciphers?
Why is large key space not enough for secure encryption according to the discussions on mono-alphabetic ciphers?
Signup and view all the answers
What condition is necessary for a cryptographic system to be considered perfectly secret?
What condition is necessary for a cryptographic system to be considered perfectly secret?
Signup and view all the answers
Explain the significance of the condition $Pr[PrivKeav_{A,Π} = 1] = rac{1}{2}$ in terms of an adversary's success.
Explain the significance of the condition $Pr[PrivKeav_{A,Π} = 1] = rac{1}{2}$ in terms of an adversary's success.
Signup and view all the answers
What does it imply if an adversary A outputs $b'$ in the PrivKeav experiment?
What does it imply if an adversary A outputs $b'$ in the PrivKeav experiment?
Signup and view all the answers
In the context of perfect encryption, what role does the encryption function play?
In the context of perfect encryption, what role does the encryption function play?
Signup and view all the answers
How does the one-time pad achieve perfect secrecy?
How does the one-time pad achieve perfect secrecy?
Signup and view all the answers
Why is it essential that the encryption scheme be indistinguishable for any two messages?
Why is it essential that the encryption scheme be indistinguishable for any two messages?
Signup and view all the answers
What is the implication of choosing random keys in the encryption process of a perfectly secret system?
What is the implication of choosing random keys in the encryption process of a perfectly secret system?
Signup and view all the answers
What does the condition $Pr[M = m | C = c]$ imply in the context of perfect encryption?
What does the condition $Pr[M = m | C = c]$ imply in the context of perfect encryption?
Signup and view all the answers
What is the primary function of the one-time pad in encryption?
What is the primary function of the one-time pad in encryption?
Signup and view all the answers
Why is the one-time pad considered to be inconvenient?
Why is the one-time pad considered to be inconvenient?
Signup and view all the answers
Explain the significance of the binary XOR operation in the context of the one-time pad.
Explain the significance of the binary XOR operation in the context of the one-time pad.
Signup and view all the answers
What condition must be met for an encryption scheme to be considered perfectly secret?
What condition must be met for an encryption scheme to be considered perfectly secret?
Signup and view all the answers
Describe the result of applying the one-time pad encryption to two messages with the same key.
Describe the result of applying the one-time pad encryption to two messages with the same key.
Signup and view all the answers
What happens when |K| < |M| in terms of security?
What happens when |K| < |M| in terms of security?
Signup and view all the answers
According to Shannon’s theory, what limitation exists regarding perfectly secret encryption schemes?
According to Shannon’s theory, what limitation exists regarding perfectly secret encryption schemes?
Signup and view all the answers
What does Pr[C = c | M = m] signify in the context of the one-time pad?
What does Pr[C = c | M = m] signify in the context of the one-time pad?
Signup and view all the answers
Study Notes
Introduction to Cryptography
- The course is titled LMAT2450 - Cryptography.
- The course is taught by François Koeune, Olivier Pereira, and T. Peters
- The course focuses on the algorithmic and mathematical aspects of securing information.
Course Goal
- Students will understand fundamental concepts, methods, and algorithms used to secure information.
Related Courses at UCL
- Information theory and coding, taught by J. Louveaux and B. Macq. and O. Pereira
- Secure electronic circuits and systems, taught by F.-X. Standaert
- Privacy Enhancing Technologies, taught by O. Pereira and F.-X. Standaert
- Secured systems engineering, taught by A. Legay
- Computer System Security, taught by R. Sadre
- Number Theory, taught by P.-E. Caprace and O. Pereira
Other Related Courses
- Machine Learning, taught by J. Lee and M. Verleysen
- Computer Networks, taught by O. Bonaventure
- Discrete Mathematics II: Algorithms and complexity, taught by J.-C. Delvenne
- Ethics and ICT, taught by A. Gosseries and O. Pereira
Class Organisation
- Lectures are held on Wednesday from 14:00 to 16:00.
- Exercises are held on Wednesday from 16:15 to 18:15.
- TAs are Antoine Legat and Alexis Vuille.
- Students are allowed to use slides and personal notes during exams
- Past exam questions are often used as exercises.
Syllabus
- The course will cover Introduction (1 lecture)
- Symmetric cryptography (4 lectures)
- Asymmetric cryptography and algorithmic number theory (5 lectures)
- Post-quantum cryptography (1 lecture)
Support Material
- Introduction to Modern Cryptography (3rd edition) by J. Katz and Y. Lindell, Chapman & Hall/CRC - 2021, http://www.cs.umd.edu/~jkatz/imc.html
- Other references (see also Moodle):
- D. Stinson, Cryptography, Theory and Practice, 3rd edition, Chapman & Hall/CRC, 2005.
- N.P. Smart, Cryptography Made Simple, Springer, 2016. (Free access within UCLouvain network)
- A.J. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, 1999. (Free on http://www.cacr.math.uwaterloo.ca/hac/)
- D. Boneh, V. Shoup, A Graduate Course in Applied Cryptography, Free draft on http://toc.cryptobook.us/.
- S. Gabraith, Mathematics of Public Key Cryptography, Cambridge University Press, 2012, Extended version from author's homepage.
Cryptography...
- COD defines cryptography as "the art of writing or solving codes".
- This definition was mostly true until the mid-20th century
- Cryptography was primarily used by armies and diplomats.
Cryptography... Today
- Cryptography is used widely in daily life.
- Examples include car security systems, identification cards, and security in financial transactions.
- Cryptography is much more than just encryption, instead it's also used in key exchange, identification and is used in elections.
The Cryptography Problem
- The diagram shows a basic message encryption problem between 2 users (A and B).
- A sends a message
m
to B. - The system receives
m
and encrypts it intoc
and sends it to B. - B decrypts the message and reads
m
.
Message Encryption
-
An encryption scheme consists of three components: Gen, Enc, and Dec.
-
Gen probabilistically produces a key, k
-
Enc encrypts the message, m, using the key k, producing a ciphertext, c
-
Dec decrypts the ciphertext, c, using the key, k, recovering the original message, m
-
The Scytale (Greece, 7th century BC) involves using a cylinder to encrypt messages based on its diameter.
-
The Caesar's cipher (Rome, 1st c. BC) involves shifting each letter of the alphabet a fixed number of positions.
Cryptanalysis
- Cryptanalysis is the art of code-breaking or cracking codes.
- In cryptanalysis, the attacker should consider which information should be secret, like Gen, Enc, Dec, or k.
- The attacker should identify which attack scenario would be used. Possible attacks include eavesdropping or chosen-plaintext attacks.
- Kerckhoffs' principle (1883) states that only the secret key should be kept secret. This principle is to ensure that the encryption scheme and algorithm can be public knowledge.
Cryptanalysis: Attacker Model
- The attacker needs to determine which attack scenario is relevant.
- Passive attacks (e.g., ciphertext-only, known-plaintext) involve observing the ciphertext only, or observing plaintext/ciphertext pairs
- Active attacks (e.g., chosen-plaintext, chosen-ciphertext) involve the ability to choose messages to be encrypted or decrypted.
Mono-alphabetic Substitution
- An improvement on Caesar's cipher, allows any permutation of the alphabet.
- The possible keys are 26! ≈ 288
- To break this, frequency analysis can be useful if the plaintext language is known.
- This shows that frequency analysis can be useful in breaking substitution ciphers.
Mono-alphabetic Substitution (Frequencies)
- Frequency analysis can help in breaking codes because letter frequencies in English and other languages vary.
Vigenère Cipher
- A further improvement over substitution ciphers using a repeating key to determine the shift factor for each letter
- To break this, enough ciphertext is needed to determine the keylength by trial and error.
- Frequency analysis is then used to break the code.
Historic Ciphers
- Cryptography has a long history.
- For example. D. Kahn, or J. Stern.
Modern Cryptography
- Definitions, assumptions, proofs.
Modern Cryptography: Definitions
- Defining what needs to be done, and defining why one scheme is better than another.
Example of Encryption
- Cryptography needs to define security for encryption schemes.
- Given a ciphertext, an attacker shouldn't be able to recover the key or the plaintext.
- Given a ciphertext, an attacker shouldn't be able to recover any character or function of the plaintext.
Modern Cryptography: Precise Assumptions
- Most schemes rely on computational assumptions, useful for abstraction and scheme comparison.
Modern Cryptography: Proof of Security
- Relate schemes, definitions, and assumptions using a reductionist approach. If a scheme can be broken, an assumption can also be falsified.
Modern Cryptography: Definitions (Limitations)
- Science vs. real-world limitations.
- Checking intuitive properties.
- Comparing with other definitions and attack examples.
- Using definitions for a period of time.
Perfect Encryption
- Shannon (1949) showed that theoretically, perfect encryption is possible.
Perfect Encryption (Definition)
- A triple (Gen, Enc, Dec) is perfectly secret if the probability of a ciphertext given a message is equal to the probability of the message
- Enc, Dec may be probabilistic or deterministic.
- M and C are sets of possible messages and ciphertexts.
Perfect Encryption (Equivalent Definition)
- If for any two messages (m and m'), in a given ciphertext, the probability of m is equal to m'
- This means that the ciphertext corresponding to the two messages cannot be distinguished.
Perfect Encryption (Example)
- The One-Time Pad (OTP) is a perfectly secret encryption scheme.
- OTP uses a key that is as long as the message.
- Each bit of the message is XORed with the corresponding key bit to produce the ciphertext.
- XOR is a binary operation that returns 1 if the inputs are different and 0 if they are the same.
One-Time Pad
- The one-time pad is perfectly secret but is not convenient to use.
- The key needs to be as long a message to be secure.
- If a key is used twice with multiple messages, then the adversary can solve the code.
Limits of Perfect Secrecy
- Schemes with shorter key lengths than messages can't be perfectly secret
- Because of this the ciphertext is not equally probable under different messages.
Conclusion
- Perfectly secret encryption schemes exist, but are difficult to use.
- Shannon's work indicates that a theoretical limit exists under various assumptions.
- The next topic in the course will discuss bounded computational power.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores the evolution and principles of cryptography from the mid-20th century to present day. It covers applications, encryption schemes, and significant problems in the field, including practical implications of perfect encryption and Kerckhoffs' principle.