Preuves De Connaissances Interactives Et Non-Interactives Olivier Blazy

Total Page:16

File Type:pdf, Size:1020Kb

Preuves De Connaissances Interactives Et Non-Interactives Olivier Blazy Preuves de connaissances interactives et non-interactives Olivier Blazy To cite this version: Olivier Blazy. Preuves de connaissances interactives et non-interactives. Cryptographie et sécurité [cs.CR]. Université Paris-Diderot - Paris VII, 2012. Français. tel-00768787 HAL Id: tel-00768787 https://tel.archives-ouvertes.fr/tel-00768787 Submitted on 24 Dec 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Ecole´ Normale Sup´erieure D´epartement d’Informatique Universit´eParis 7 Denis Diderot Preuves de connaissance interactives et non-interactives Th`ese pr´esent´eeet soutenue publiquement le 27 septembre 2012 par Olivier Blazy pour l’obtention du Doctorat de l’Universit´eParis Diderot (sp´ecialit´einformatique) Devant le jury compos´ede : Directeur de th`ese: David Pointcheval (CNRS, Ecole´ Normale Sup´erieure) Rapporteurs : Jean-S´ebastien Coron (Universit´edu Luxembourg) Marc Fischlin (Universit´ede Darmstadt) Fabien Laguillaumie (CNRS, LIP) Examinateurs : Michel Abdalla (CNRS, Ecole´ Normale Sup´erieure) Antoine Joux (DGA, Universit´ede Versailles) Eike Kiltz (Universit´ede la Ruhr, Bochum) Damien Vergnaud (CNRS, Ecole´ Normale Sup´erieure) Travaux effectu´es au Laboratoire d’Informatique de l’Ecole´ Normale Sup´erieure Remerciements Bien des gens ont contribu´ede pr`es ou de loin `al’accomplissement de ce m´emoire. Je commencerai tout d’abord par remercier mon directeur de th`ese, David Pointcheval, qui m’a aid´eet soutenu tout au long de ma th`ese. Merci pour ta grande disponibilit´e, ta patience, tes pr´ecieux conseils, pour toutes ces discussions qui ont ´et´etr`es enrichissantes. Merci pour tes encouragements, ton optimisme. Ce fut un vrai plaisir d’ˆetre ton ´el`eve pendant ces ann´ees. Il ne faut pas non plus oublier Jean-S´ebastien Coron, Marc Fischlin et `aFabien Laguillaumie. Je leur suis extrˆemement reconnaissant d’avoir accept´ede sacrifier une partie de leur ´et´epour rapporter ma th`ese. Je remercie ´egalement Michel Abdalla, Antoine Joux, Eike Kiltz, et Damien Vergnaud de me faire l’honneur d’ˆetre dans le jury de ma soutenance. Sans un cadre ad´equat ce m´emoire n’aurait pas vu le jour. Merci `atoute l’´equipe Crypto de l’Ecole´ Normale Sup´erieure pass´ee et pr´esente. Merci `atous pour ces excellentes conditions de travail. Je n’oserai pas essayer de nommer tous les gens exceptionnels rencontr´es au sein de l’´equipe de peur d’involontairement en oublier. Merci `atous les permanents pour leur bonne humeur et leur conseil, merci aussi aux stagiaires, th´esards, post-docs pour l’ambiance qu’ils ont su cr´eer. Merci ´egalement `a toute l’´equipe administrative et au service informatique pour leur gentillesse et leur flexibilit´ece qui a rendu ces ann´ees ici si agr´eable. Merci aussi aux anciens de m’avoir montr´ela voie, j’esp`ere avoir l’occasion de pouvoir collaborer avec vous `anouveau. On dit que les voyages forment la jeunesse, mais aussi les th´esards. Je souhaite aussi remercier toutes les personnes que j’ai pu rencontrer au cours de mes stages que ce soit `a Louvain-la-Neuve en Belgique, ou `aMountain View en Californie, leur bonne humeur et leurs conseils divers m’ont confort´edans l’id´ee de faire une th`ese en cryptographie, et ´egalement tous les soutiens que j’ai pu trouver au cours des diverses conf´erences auxquelles j’ai pu participer. Une ANR a aussi ax´ema recherche. J’aimerai ´egalement exprimer ma gratitude `atout le reste de l’´equipe PACE pour m’avoir int´egr´eau projet et pour les divers ´echanges d’id´ees lors des r´eunions. N’oublions le plus important, je tiens `aremercier mes parents qui me soutiennent depuis le d´ebut mˆeme quand je me mets `aleur parler de choses incompr´ehensibles. On n’est pas constitu´euniquement de 0 ou de 1. Merci `atous les amis qui m’ont accompagn´ependant ces trois ann´ees, et qui m’ont support´emˆeme quand je leur racontais mon sujet de th`ese pour la ´eni`eme fois, ou qu’au milieu de conversation je d´eviais subtilement la discussion vers quelque chose de nettement plus cryptique. Sans chercher `aˆetre exhaustif, je tiens `a´evoquer mes colocataires qui ont permis `aces trois ann´ees de se passer dans de bonnes conditions1. Merci `atous mes comparses normaliens pour les bons moments pass´es et toutes ces ann´ees de souvenirs. Merci aux anciens des Lazos pour leur soutien depuis notre arriv´ee sur Paris. Une personne m´erite une place toute particuli`ere dans ces remerciements, sans son aide cette th`ese serait d´epourvue d’un certain je ne sais quoi : . Rassurez-vous ces remerciements arrivent `aleur fin. Il ne faut juste pas oublier celles et ceux qui ont relu cette th`ese de gr´eou de force ;) Sigles, acronymes pars`ement ce manuscrit, cependant certains n’ont pas trouv´es places dans cette th`ese, et je ne peux m’empˆecher de les laisser `ala sagacit´edu lecteur. Une journ´ee type peut se r´esumer, aux ordre de multiplicit´es pr`es, par MD, RER, ENS, DI, TS, SC. Il y a aussi des choses comme TBBT, DDR, HIMYM, GoT, COF, CDG, TSW. Sans oublier Team B2, TrTeam et les trop rares membres de Squirrel Corp. 1Merci surtout pour les discussions sur les articles `a3h du matin autour d’un verre de soupline i Contents 1 Introduction 1 1.1 A Brief History of Cryptography . 2 1.1.1 AncientTime...................................... 2 1.1.2 MedievalEra ...................................... 2 1.1.3 ModernEra....................................... 2 1.2 Digital Signatures Enhanced with NIZK . 3 1.2.1 Motivation . 3 1.2.2 Instantiations and Applications . 5 1.3 Smooth Projective Hash Function, and Implicit Proof of Knowledge . ........... 8 1.3.1 Motivation . 8 1.3.2 Results and Instantiations . 10 1.4 Extra-Tools ........................................ 12 2 Technical Introduction 15 2.1 Notations . 15 2.2 Definitions........................................ 17 2.2.1 Generalities..................................... 17 2.2.2 SecurityHypotheses ................................ 17 2.2.3 Universal Composability . 18 2.2.4 Standard Cryptographic Primitives . 19 2.3 Classical Instantiations . 25 2.3.1 Waters Signature . 25 2.3.2 PedersenCommitment............................... 26 2.3.3 ElGamal Encryption / Commitment . 26 2.3.4 Linear Encryption / Commitment . 27 2.4 Zero-Knowledge and Witness Indistinguishable Proofs . 29 2.4.1 Groth-Sahai Methodology . 29 2.4.2 Initial Optimization of Groth-Sahai Proofs . 33 2.5 Smooth Projective Hash Functions . 33 2.5.1 On a Linear Encryption . 33 2.5.2 On an ElGamal Encryption . 34 2.6 New Results on Standard Primitives . 35 2.6.1 Batch Groth-Sahai . 35 2.6.2 Application to Existing Protocols . 38 2.6.3 Asymmetric Waters Signature . 41 2.6.4 Waters Function Programmability . 42 2.6.5 Multi Cramer-Shoup Encryption . 46 2.6.6 Commitment `ala Lindell ................................ 52 I Groth-Sahai Based Protocols 53 3 Group Based Signatures 55 3.1 GroupSignatures..................................... 55 3.1.1 Security Notions . 56 3.2 Traceable Signatures . 57 3.2.1 Security Notions for Traceable Signatures . 57 ii 3.2.2 Traceable Group Signatures with Stepping Capabilities . 61 3.3 ListSignatures ...................................... 66 3.3.1 Security Notions for List Signatures . 66 3.3.2 List Signatures in the Standard Model . 67 4 Signatures on Randomizable Ciphertexts 70 4.1 Definition, and Security Notions . 70 4.2 Instantiations...................................... 73 4.2.1 A First Instantiation . 73 4.2.2 An Efficient Instantiation . 76 4.3 FirstApplications ................................... 79 4.3.1 Non-interactive Receipt-Free E-voting . 79 4.3.2 Blind Signatures and Variants . 80 4.4 To Further Applications of Signatures on Randomizable Ciphertexts . 82 4.4.1 To Perfectly Blind Signature with Partial Blindness . 82 4.4.2 Multi-BlindSignature .............................. 87 4.4.3 Other Applications . 89 II Using Smooth Projective Hash Functions to Create Implicit Proofs of Knowledge 91 5 Manageable Languages 93 5.1 First Languages . 94 5.1.1 Commitment of a Valid Signature . 94 5.1.2 Extended Commitment of a Message . 95 5.2 Linear Languages . 97 5.2.1 A Single Equation . 97 5.2.2 MultipleEquations................................. 98 5.2.3 Smoothness of a SPHF on Linear Pairing Product Equations . 99 5.3 WithOtherKindsofCommitments . 99 5.3.1 With a Multi-Linear Cramer-Shoup . 99 5.3.2 With our Equivocable Commitment `ala Lindell . 100 6 Applications 102 6.1 Oblivious Signature-Based Envelope . 102 6.1.1 Definition and Security Properties . 103 6.1.2 High Level Instantiation . 105 6.1.3 Concrete Instantiation . 109 6.2 Round-Optimal Blind Signature Revamped . 110 6.3 Language Authenticated Key Exchange . 111 6.3.1 Definitions ....................................... 112 6.3.2 The Ideal Functionality . 112 6.3.3 AFirstGenericConstruction . 113 6.3.4 Notations . 115 6.3.5 Description of the Simulators . 117 6.4 Efficient Instantiation of AKE protocols . 120 6.4.1 Useful Languages . 120 6.4.2 Password Authenticated Key Exchange . 120 6.4.3 Verifier-basedPAKE................................. 120 6.4.4 Complexity ....................................... 122 Je sers la science et c’est ma joie. Prolegom´ enes` Pendant tr`es longtemps la cryptologie, et plus particuli`erement la cryptographie se restreignait au chiffre- ment, c’est `adire s’int´eressait `ala transmission d’informations entre deux utilisateurs par l’interm´ediaire d’un canal non-s´ecuris´e.
Recommended publications
  • Models and Algorithms for Physical Cryptanalysis
    MODELS AND ALGORITHMS FOR PHYSICAL CRYPTANALYSIS Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨at fur¨ Elektrotechnik und Informationstechnik an der Ruhr-Universit¨at Bochum von Kerstin Lemke-Rust Bochum, Januar 2007 ii Thesis Advisor: Prof. Dr.-Ing. Christof Paar, Ruhr University Bochum, Germany External Referee: Prof. Dr. David Naccache, Ecole´ Normale Sup´erieure, Paris, France Author contact information: [email protected] iii Abstract This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a new evolving discipline in implementation se- curity of information systems. It is based on physically observable and manipulable properties of a cryptographic implementation. Physical observables, such as the power consumption or electromag- netic emanation of a cryptographic device are so-called `side channels'. They contain exploitable information about internal states of an imple- mentation at runtime. Physical effects can also be used for the injec- tion of faults. Fault injection is successful if it recovers internal states by examining the effects of an erroneous state propagating through the computation. This thesis provides a unified framework for side channel and fault cryptanalysis. Its objective is to improve the understanding of physi- cally enabled cryptanalysis and to provide new models and algorithms. A major motivation for this work is that methodical improvements for physical cryptanalysis can also help in developing efficient countermea- sures for securing cryptographic implementations. This work examines differential side channel analysis of boolean and arithmetic operations which are typical primitives in cryptographic algo- rithms. Different characteristics of these operations can support a side channel analysis, even of unknown ciphers.
    [Show full text]
  • Indian Hieroglyphs
    Indian hieroglyphs Indus script corpora, archaeo-metallurgy and Meluhha (Mleccha) Jules Bloch’s work on formation of the Marathi language (Bloch, Jules. 2008, Formation of the Marathi Language. (Reprint, Translation from French), New Delhi, Motilal Banarsidass. ISBN: 978-8120823228) has to be expanded further to provide for a study of evolution and formation of Indian languages in the Indian language union (sprachbund). The paper analyses the stages in the evolution of early writing systems which began with the evolution of counting in the ancient Near East. Providing an example from the Indian Hieroglyphs used in Indus Script as a writing system, a stage anterior to the stage of syllabic representation of sounds of a language, is identified. Unique geometric shapes required for tokens to categorize objects became too large to handle to abstract hundreds of categories of goods and metallurgical processes during the production of bronze-age goods. In such a situation, it became necessary to use glyphs which could distinctly identify, orthographically, specific descriptions of or cataloging of ores, alloys, and metallurgical processes. About 3500 BCE, Indus script as a writing system was developed to use hieroglyphs to represent the ‘spoken words’ identifying each of the goods and processes. A rebus method of representing similar sounding words of the lingua franca of the artisans was used in Indus script. This method is recognized and consistently applied for the lingua franca of the Indian sprachbund. That the ancient languages of India, constituted a sprachbund (or language union) is now recognized by many linguists. The sprachbund area is proximate to the area where most of the Indus script inscriptions were discovered, as documented in the corpora.
    [Show full text]
  • Sarasvati Civilization, Script and Veda Culture Continuum of Tin-Bronze Revolution
    Sarasvati Civilization, script and Veda culture continuum of Tin-Bronze Revolution The monograph is presented in the following sections: Introduction including Abstract Section 1. Tantra yukti deciphers Indus Script Section 2. Momentous discovery of Soma samsthā yāga on Vedic River Sarasvati Basin Section 3. Binjor seal Section 4. Bhāratīya itihāsa, Indus Script hypertexts signify metalwork wealth-creation by Nāga-s in paṭṭaḍa ‘smithy’ = phaḍa फड ‘manufactory, company, guild, public office, keeper of all accounts, registers’ Section 5. Gaṇeśa pratimā, Gardez, Afghanistan is an Indus Script hypertext to signify Superintendent of phaḍa ‘metala manufactory’ Section 6. Note on the cobra hoods of Daimabad chariot Section 7 Note on Mohenjo-daro seal m0304: phaḍā ‘metals manufactory’ Section 8. Conclusion Introduction The locus of Veda culture and Sarasvati Civilization is framed by the Himalayan ranges and the Indian Ocean. 1 The Himalayan range stretches from Hanoi, Vietnam to Teheran, Iran and defines the Ancient Maritime Tin Route of the Indian Ocean – āsetu himācalam, ‘from the Setu to Himalayaś. Over several millennia, the Great Water Tower of frozen glacial waters nurtures over 3 billion people. The rnge is still growing, is dynamic because of plate tectonics of Indian plate juttng into and pushing up the Eurasian plate. This dynamic explains river migrations and consequent desiccation of the Vedic River Sarasvati in northwestern Bhāratam. Intermediation of the maritime tin trade through the Indian Ocean and waterways of Rivers Mekong, Irrawaddy, Salween, Ganga, Sarasvati, Sindhu, Persian Gulf, Tigris-Euphrates, the Mediterranean is done by ancient Meluhha (mleccha) artisans and traders, the Bhāratam Janam celebrated by R̥ ṣi Viśvāmitra in R̥ gveda (RV 3.53.12).
    [Show full text]
  • Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation Eric A
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 9-13-2012 Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation Eric A. Koziel Follow this and additional works at: https://scholar.afit.edu/etd Part of the Computer and Systems Architecture Commons, and the Information Security Commons Recommended Citation Koziel, Eric A., "Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation" (2012). Theses and Dissertations. 1127. https://scholar.afit.edu/etd/1127 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. EFFECTS OF ARCHITECTURE ON INFORMATION LEAKAGE OF A HARDWARE ADVANCED ENCRYPTION STANDARD IMPLEMENTATION THESIS Eric A. Koziel AFIT/GCO/ENG/12-25 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the United States Government. This material is declared a work of the U.S. Government and is not subject to copyright protection in the United States. AFIT/GCO/ENG/12-25 EFFECTS OF ARCHITECTURE ON INFORMATION LEAKAGE OF A HARDWARE ADVANCED ENCRYPTION STANDARD IMPLEMENTATION THESIS Presented to the Faculty Department of Electrical & Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Science in Cyber Operations Eric A.
    [Show full text]
  • Some Words on Cryptanalysis of Stream Ciphers Maximov, Alexander
    Some Words on Cryptanalysis of Stream Ciphers Maximov, Alexander 2006 Link to publication Citation for published version (APA): Maximov, A. (2006). Some Words on Cryptanalysis of Stream Ciphers. Department of Information Technology, Lund Univeristy. Total number of authors: 1 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 Some Words on Cryptanalysis of Stream Ciphers Alexander Maximov Ph.D. Thesis, June 16, 2006 Alexander Maximov Department of Information Technology Lund University Box 118 S-221 00 Lund, Sweden e-mail: [email protected] http://www.it.lth.se/ ISBN: 91-7167-039-4 ISRN: LUTEDX/TEIT-06/1035-SE c Alexander Maximov, 2006 Abstract n the world of cryptography, stream ciphers are known as primitives used Ito ensure privacy over a communication channel.
    [Show full text]
  • Cryptography Weekly Independent Teaching Activities Teaching Credits Hours 4 6
    COURSE OUTLINE (1) GENERAL SCHOOL SCHOOL OF SCIENCES ACADEMIC UNIT DEPARTMENT OF MATHEMATICS LEVEL OF STUDIES UNDERGRADUATE PROGRAM COURSE CODE 311-2003 SEMESTER F COURSE TITLE CRYPTOGRAPHY WEEKLY INDEPENDENT TEACHING ACTIVITIES TEACHING CREDITS HOURS 4 6 COURSE TYPE Special background PREREQUISITE COURSES: NO LANGUAGE OF INSTRUCTION and GREEK EXAMINATIONS: IS THE COURSE OFFERED TO YES ERASMUS STUDENTS COURSE WEBSITE (URL) http://www.math.aegean.gr/index.php/en/academics/undergraduate- programs (2) LEARNING OUTCOMES Learning outcomes In this course the students are introduced to the basic complexity theory and how computational difficulty in solving problems can be exploited to build secure cryptographic protocols. The lectures are, then, focused on some elementary cryptographic schemes like Caesar’s cipher, general substitution ciphers, polyalphabetic ciphers and how they can be broken efficiently. Then the students are introduced to Shannon’s cryptographic principles of confusion and diffusion and how they lead to the Feistel-based block ciphers. Then, as case studies, the block ciphers DES, CAST-128 and AES are presented along with analysis of their security properties. In the middle of the course, the students are introduced to public key cryptography and the RSA, ElGamal scheme and the foundations of Elliptic Curve Cryptography as well as the state of the art in the cryptanalysis of RSA and ECC. The aim of this course is mainly to introduce the students into the basic concepts of cryptography and cryptanalysis. At the end of the course, they could develop and analyse certain cryptographic systems and they could be ready to use and modify certain cryptanalysis techniques.
    [Show full text]
  • Université D'antananarivo École Supérieure Polytechnique Département Électronique
    N° ... / EN / II / 01 Année Universitaire : 2000 / 2001 UNIVERSITÉ D'ANTANANARIVO ÉCOLE SUPÉRIEURE POLYTECHNIQUE DÉPARTEMENT ÉLECTRONIQUE MÉMOIRE DE FIN D'ÉTUDES en vue de l'obtention du diplôme d'ingénieur Spécialité : Électronique Option : Informatique Industrielle Présenté par : M. RAKOTOZAFY Iandrinandrianina Tolojanahary M. RAZAFINDRADINA Henri Bruno Soutenu le 17 septembre 2002 DEVELOPPEMENT D’UN CRYPTOSYSTEME SOUS LINUX MÉMOIRE D’INGÉNIEUR EN ÉLECTRONIQUE Option : Informatique Industrielle Présenté par : M. RAKOTOZAFY Iandrinandrianina Tolojanahary M. RAZAFINDRADINA Henri Bruno Devant le jury : · M. RASTEFANO Elisée : Président · M. RABESANDRATANA ANDRIAMIHAJA Mamisoa : Examinateur · M. RAKOTOMIRAHO Soloniaina : Examinateur · M. RATSIMBA MAMY Nirina : Examinateur Rapporteur : Mme RABEHERIMANANA Lyliane Irène Soutenu le 17 septembre 2002 Remerciements Le présent travail n’a pu être accompli sans le concours d’un certain nombre de personnes. Ainsi tenions-nous à exprimer notre haute et fidèle considération : · A Monsieur RASTEFANO Elisée, Chef du Département Electronique et Président de ce mémoire, qui n’a cessé de chercher voies et moyens, parmi les meilleurs qui soient, pour assurer notre formation. · A Madame RABEHERIMANANA Lyliane Irène, Enseignant Chercheur à l’E.S.P.A. et rapporteur de ce mémoire. En dépit de ses multiples responsabilités, elle n’a nullement ménagé son temps pour nous guider ou pour nous faire part de ses précieux conseils et directives. · Aux examinateurs : M. RABESANDRATANA ANDRIAMIHAJA Mamisoa, M. RAKOTOMIRAHO Soloniaina, M. RATSIMBA MAMY Nirina qui, malgré la pluralité de leurs services socio-professionnels ainsi que d’autres obligations, ont accepté de siéger parmi les membres du jury. Notre considération s’adresse également à tous les Enseignants du Département Electronique. Ils nous ont partagé leur savoir-faire en matière de technologie électronique, informatique et de gestion, ainsi que tout ce qui touche les compétences et valeurs humaines, morales et sociales escomptées de l’ingénieur.
    [Show full text]
  • Cryptography
    CS 419: Computer Security Week 6: Cryptography © 2020 Paul Krzyzanowski. No part of this Paul Krzyzanowski content, may be reproduced or reposted in whole or in part in any manner without the permission of the copyright owner. cryptography κρυπός γραφία hidden writing A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 2 cryptanalysis κρυπός ἀνάλυσις hidden action of loosing, solution of a problem, undo The analysis and decryption of encrypted text or information without prior knowledge of the keys. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 3 cryptology κρυπός λογια hidden speaking (knowledge) 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 4 Cryptography ¹ Security Cryptography may be a component of a secure system Just adding cryptography may not make a system secure October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 5 Cryptography: what is it good for? • Confidentiality – Others cannot read contents of the message • Authentication – Determine origin of message • Integrity – Verify that message has not been modified • Nonrepudiation – Sender should not be able to falsely deny that a message was sent October 16, 2020 CS
    [Show full text]
  • CE441: Data and Network Security Cryptography — Symmetric
    CE441: Data and Network Security Cryptography — Symmetric Behnam Momeni, PhD Department of Computer Engineering Sharif University of Technology Fall 2019 . B. Momeni (Sharif Univ. of Tech.) CE441: Data and Network Security Fall 2019 1 / 94 Cryptology: Cryptography and Cryptanalysis Review: What Does Security Mean? Outline 1 Cryptology: Cryptography and Cryptanalysis Review: What Does Security Mean? Cryptography: Definition and Models Classic Cryptography Cryptanalysis: A Glimpse 2 Confidentiality-Providing Schemes 3 Integrity-Providing Schemes 4 Full Fledged Schemes . B. Momeni (Sharif Univ. of Tech.) CE441: Data and Network Security Fall 2019 2 / 94 Cryptology: Cryptography and Cryptanalysis Review: What Does Security Mean? Security Goals Availability CIA Triad Confidentiality Integrity . B. Momeni (Sharif Univ. of Tech.) CE441: Data and Network Security Fall 2019 3 / 94 Cryptology: Cryptography and Cryptanalysis Review: What Does Security Mean? Definition Defining an scheme has two main parts Syntax: specifies operations which can be performed by honest participants of the scheme e.g. The symmetric encryption scheme, SE = (K; E; D), contains a key generation function K, an encryption function E, and a decryption function D k K : 8m : Dk (Ek (m)) = m The scheme is modeled here Semantic: specifies conditions which must be met by a secure scheme The security definition is formalized here . B. Momeni (Sharif Univ. of Tech.) CE441: Data and Network Security Fall 2019 4 / 94 Cryptology: Cryptography and Cryptanalysis Review: What Does Security Mean? Game-based Definition Model the scheme operations normally Then, devise a game between an adversary and a challenger Adversary tries to break the security definition Challenger wants to demonstrate inability of the adversary Adversary is trying to obtain some advantage e.g.
    [Show full text]
  • Security System on Data Encryption & Decryption
    International Research Journal of Engineering and Technology (IRJET)e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 Security System on Data Encryption & Decryption Mr. Mukul Aggarwal1, Mr. Deepak Kumar Yadav2, Dr. Himanshu Arora3 and Mr. Sudhanshu Vashistha4 1B. Tech Student, Department of CSE, Arya College of Engineering and Research Center, Jaipur 2B. Tech Student, Department of CSE, Arya College of Engineering and Research Center, Jaipur 3Professor, Department of CSE, Arya College of Engineering and Research Center, Jaipur 4Assistant Professor, Department of CSE, Arya College of Engineering and Research Center, Jaipur ---------------------------------------------------------------------- ***--------------------------------------------------------- Abstract— Now’s a day’s security is a feature or factor which is most services attack. It is the attack in which third- person important about any sector which ensures the protection of data. It directly access the server. prevents unauthorized persons, thieves, hackers, etc. In this field, Access Control: It is the process in which only authorized there are three main feature which is essential for data security i.e. person can only access the data resources confidentiality, integrity, availability, these three main features which prevent from unauthorized any other third person. Confidentiality TABLE I basically if we send the data from one person to another person then FONT SIZES FOR PAPERS only authorized person can access & integrity if we transfer the information from one to another then no one can change. The availability of the resources should be available 24/7 hour or data should be available on demand. Process of communication using Encryption and Decryption over data. To convert the plain text into ciphertext is Encryption and convert the ciphertext into plain text is Decryption and both methods called as a Cryptology.
    [Show full text]
  • Alice and Bob in Wonderland a First Glimpse in the World of Security and Cryptography
    NXP SEMICONDUCTORS Alice and Bob in Wonderland A first glimpse in the world of security and cryptography September 2018 Mario Lamberger Agenda Introduction The Good The Bad The Ugly The Future COMPANY PUBLIC Introduction About myself MSc, PhD in technical mathematics, TU Graz Post-doc assistant at IAIK @ TU Graz – Java + network security, cryptography Habilitation in IT-Security @ IAIK/TU Graz 20+ publications in mathematics, cryptography, IT-security Principal Cryptographer and Security Assessment expert @ NXP – Joined 2011 – Works on crypto libraries, certification topics, analysis on random number generators – Lead of „NXP Security School“, trainings on cryptography, certification topics, implementation security Trained more than 2500 employees COMPANY PUBLIC THE GOOD Security in general COMPANY PUBLIC Key security requirements “Hello Confidentiality World” Integrity Keeping secrets Ensuring unmodified secret (business value data transport & “Hello “Hello of data, privacy – unmodified SW World” World” encryption is the execution technology of choice) Authenticity Alice Availability Verifying identities for Ensuring that the source of data/SW, “Fake” Bob services remain (trusted access control available operations) Bob “Fake” Alice COMPANY PUBLIC CONFIDENTIALITY Historic examples: This ... is ... Sparta! Scytale: – Oldest known military encryption scheme. – It was used by the Spartans already 2500 years ago to encrypt messages. – For encryption a wooden cylinder has been used with a certain diameter (acting as the key). The Scytale is a transposition cipher. Alternative hypothesis: Message authentication COMPANY PUBLIC Historic examples: Alea iacta est! Caesar cipher – The Caesar-Cipher is named after Julius Caesar (100-40 B.C.). – It was used for military correspondence. – For encryption the letters of the message where replaced by different letters of the same alphabet.
    [Show full text]
  • Les Codes Secrets Décryptés
    1. Introduction « On a inventé l’art d’écrire avec des chiffres ou avec des caractères inconnus pour dérober la connaissance de ce qu’on écrit à ceux qui interceptent des lettres, mais l’industrie des hommes, qui s’est raffi- née par la nécessité & l’intérest, a trouvé des règles pour déchiffrer ces lettres & pour pénétrer par ce moyen dans les secrets d’autruy. » François de Callières (1645 - 1717) e livre est le chaînon manquant de la cryptographie. En Ceffet, quand on parle de codes secrets (on ose à peine parler de cryptographie, car la plupart des gens, même les libraires, ignorent la signification de ce terme quelque peu effrayant), on a d’un côté des livres d’histoire ou des livres pour les enfants, et de l’autre côté des livres de niveau universitaire remplis de formules et de théorèmes souvent difficilement compréhensibles pour le commun des mortels. L’ambition de ce livre est de faire le lien entre ces deux mondes. Il s’adresse à tous les curieux qui ont encore un vague souvenir des messages secrets qu’ils échangeaient sur les bancs de l’école, aux créateurs d’énigmes et aux chasseurs de trésors. Les enseignants pourront aussi y trouver une matière qui passionne les élèves, et qui permet d’aborder par la pratique certains concepts mathématiques dont l’utilité ne saute pas aux yeux, comme les matrices ou les nombres premiers. La cryptographie est à la fois une science et un art. C’est une science, car la résolution des problèmes exige la connaissance de certaines règles, lesquelles, tout en admettant beaucoup d’exceptions, n’en sont pas moins fixes et définies ; ces règles entraînent une suite de raisonnements logiques.
    [Show full text]