Fragments of a Chapter on Encryption Schemes

Fragments of a Chapter on Encryption Schemes

Extracted from a working draft of Goldreich's FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice. Fragments of a chapter on Encryption Schemes Extracts from Foundations of Cryptography in preparation Oded Goldreich Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot Israel December Extracted from a working draft of Goldreich's FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice. I to Dana c Copyright by Oded Goldreich Permission to make copies of part or all of this work for p ersonal or classro om use is granted without fee provided that copies are not made or distributed for prot or commercial advantage and that new copies b ear this notice and the full citation on the rst page Abstracting with credit is p ermitted Extracted from a working draft of Goldreich's FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice. II Extracted from a working draft of Goldreich's FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice. Preface It is p ossible to build a cabin with no foundations but not a lasting building Eng Isidor Goldreich Cryptography is concerned with the construction of schemes that withstand any abuse Such schemes are constructed so to maintain a desired functional ity even under malicious attempts aimed at making them deviate from their prescrib ed functionality The design of cryptography schemes is a very dicult task One cannot rely on intuitions regarding the typical state of the environment in which the system op erates For sure the adversary attacking the system will try to manipulate the environment into untypical states Nor can one b e content with counter measures designed to withstand sp ecic attacks since the adversary which acts after the design of the system is completed will try to attack the schemes in ways that are typically dierent from the ones the designer had envisioned The validity of the ab ove assertions seems selfevident still some p eople hop e that in practice ignoring these tautologies will not result in actual damage Exp erience shows that these hop es rarely come true cryptographic schemes based on make b elieve are broken typically so oner than later In view of the ab ove we b elieve that it makes little sense to make assumptions regarding the sp ecic strategy that the adversary may use The only assump tions that can b e justied refer to the computational abilities of the adversary Furthermore it is our opinion that the design of cryptographic systems has to b e based on rm foundations whereas adho c approaches and heuristics are a very dangerous way to go A heuristic may make sense when the designer has a very go o d idea ab out the environment in which a scheme is to op erate yet a cryptographic scheme has to op erate in a maliciously selected environment which typically transcends the designers view This b o ok is aimed at presenting rm foundations for cryptography The foundations of cryptography are the paradigms approaches and techniques used to conceptualize dene and provide solutions to natural security concerns We will present some of these paradigms approaches and techniques as well as some of the fundamental results obtained using them Our emphasis is on III Extracted from a working draft of Goldreich's FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice. IV the clarication of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems Solving a cryptographic problem or addressing a security concern is a two stage pro cess consisting of a denitional stage and a constructive stage First in the denitional stage the functionality underlying the natural concern is to b e identied and an adequate cryptographic problem has to b e dened Trying to list all undesired situations is infeasible and prone to error Instead one should dene the functionality in terms of op eration in an imaginary ideal mo del and require a candidate solution to emulate this op eration in the real clearly dened mo del which sp ecies the adversarys abilities Once the denitional stage is completed one pro ceeds to construct a system that satises the denition Such a construction may use some simpler to ols and its security is proven relying on the features of these to ols In practice of course such a scheme may need to satisfy also some sp ecic eciency requirements This b o ok fo cuses on several archetypical cryptographic problems eg en cryption and signature schemes and on several central to ols eg computa tional diculty pseudorandomness and zeroknowledge pro ofs For each of these problems resp to ols we start by presenting the natural concern un derlying it resp its intuitive ob jective then dene the problem resp to ol and nally demonstrate that the problem may b e solved resp the to ol can b e constructed In the latter step our fo cus is on demonstrating the feasibility of solving the problem not on providing a practical solution As a secondary concern we typically discuss the level of practicality or impracticality of the given or known solution Computational Diculty The sp ecic constructs mentioned ab ove as well as most constructs in this area can exist only if some sort of computational hardness exists Sp ecically all these problems and to ols require either explicitly or implicitly the ability to generate instances of hard problems Such ability is captured in the denition of oneway functions see further discussion in Section Thus oneway functions is the very minimum needed for doing most sorts of cryptography As we shall see they actually suce for doing much of cryptography and the rest can b e done by augmentations and extensions of the assumption that oneway functions exist Our current state of understanding of ecient computation do es not allow us to prove that oneway functions exist In particular the existence of one way functions implies that NP is not contained in BPP P not even on the average which would resolve the most famous op en problem of computer science Thus we have no choice at this stage of history but to assume that oneway functions exist As justication to this assumption we may only oer the combined b elieves of hundreds or thousands of researchers Furthermore these b elieves concern a simply stated assumption and their validity follows from several widely b elieved conjectures which are central to some elds eg the conjecture that factoring integers is hard is central to computational number theory Extracted from a working draft of Goldreich's FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice. V As we need assumptions anyhow why not just assume what we want ie the existence of a solution to some natural cryptographic problem Well rst we need to know what we want as stated ab ove we must rst clarify what exactly we want that is go through the typically complex denitional stage But once this stage is completed can we just assume that the denition derived can b e met Not really once a denition is derived how can we know that it can at all b e met The way to demonstrate that a denition is viable and so the intuitive security concern can b e satised at all is to construct a solution based on a better understood assumption ie one that is more common and widely b elieved For example lo oking at the denition of zeroknowledge pro ofs it is not apriori clear that such pro ofs exist at all in a nontrivial sense The nontriviality of the notion was rst demonstrated by presenting a zeroknowledge pro of system for statements regarding Quadratic Residuosity which are b elieved to b e hard to verify without extra information Furthermore in contrary to prior b eliefs it was later shown in that the existence of oneway functions implies that any NP statement can b e proven in zeroknowledge Thus facts which were not known at all to hold and even b elieved to b e false where shown to hold by reduction to widely b elieved assumptions without which most of mo dern cryptography collapses anyhow To summarize not all assumptions are equal and so reducing a complex new and doubtful assumption to a widelyb elieved simple or even merely simpler assumption is of great value Furthermore reducing the solution of a new task to the assumed security of a wellknown primitive typically means providing a construction that using the known primitive solves the new task This means that we do not only know or assume that the new task is solvable but rather have a solution based on a primitive that b eing wellknown typically has several candidate implementations Structure and Prerequisites Our aim is to present the basic concepts techniques and results in cryptography As stated ab ove our emphasis is on the clarication of fundamental concepts and the relationship among them This is done in a way indep endent of the particularities of some p opular number theoretic examples These particular examples played a central role in the development of the eld and still oer the most practical implementations of all cryptographic primitives but this do es not mean that the presentation has to b e linked to them On the contrary we b elieve that concepts are b est claried when presented at an abstract level decoupled from sp ecic implementations Thus the most relevant background for this b o ok is provided by basic knowledge of algorithms including random ized ones computability and elementary probability theory Background on computational number theory which is required for sp ecic implementations of certain constructs is not really required here yet a short app endix presenting the most relevant facts is included in this volume so to supp ort the few examples of implementations presented here Extracted from a working draft of Goldreich's FOUNDATIONS OF CRYPTOGRAPHY.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    63 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us