1 Introduction
1 Introduction
Applied Crypto:
Introduction
Amir Rezapour
Institute of Information Security,
National Tsing Hua University
Introduction
• The goal of cryptographic objects is to protect other
objects.
– Thus, we need to ensure their security first.
Buy 500
shares of
NYSE:tsm
Alice for 81$. Bob
Alice
𝑡1 𝑡2 𝑡3
NTHU Applied Crypto 2024 9
Non-repudiation
• Digital signature: a public-key method of emulating
handwritten signatures to ensure non-repudiation.
– Signing (private) key: 𝑠𝑘 for the signer
– Verification(public) key: 𝑣𝑘(𝑝𝑘) for verifiers
– 𝑠 = 𝑆𝑖𝑔𝑛(𝑠𝑘, 𝑚);
– 𝑉𝑒𝑟𝑖𝑓𝑦(𝑣𝑘, 𝑚, 𝑠) =true or false.
𝑚 =? 𝑐 = 1001 KeyGen()
𝑚1 = 1010
𝑘1 =0111 𝑐1 = 1101 Plaintext query
𝑚2 = 0100
𝑘2 =0011 𝑐1 = 0111
⋮
Outputs 𝑚 = 0101, correct/wrong?
𝑚 =? 𝑐 = 1001 KeyGen()
𝑐1 = 0100
𝑘1 =1001 𝑚1 = 1101 Ciphertext query
𝑐2 = 1111
𝑘2 =1010 𝑚2 = 0101
⋮
Outputs 𝑚 = 1010, correct/wrong?
(𝐺, 𝑉 − 2)
𝐴
𝑖← yes
⋮
(𝐺, 𝑉 − 𝑖 − 1)
no