Cry 2
Cry 2
In backsecure, privately
Writing to
channel. eavesdropper)
tappable be Alice
to Encan plaintext
requirethenciphertext,
privacythis and
use algorithm
respectively.
dates communication, and
words to
to insecure
andtheir
can intoalgorithms
later ciphertexts
writing" How message,
a
which Hidden
wants will ciphertexts receiving
Greek "open"(for an
write" parties. an like channel. key,into
problem, Alice Eve they decryption
two "hidden over would
an adversary their a
a
encrypt
thatof messages
descramble) upon
the"to two Cryptography:
Bob.Bobto
andcryptographic
using Bob the
refer startingconsists
code"
from between to on and to Bob,
Introduction
"hidden"
stems of
andplaintexts)
hereandan sent
Aliceof Before
plaintext key
encryption
code (or task. Bob.
"secret
1
taskcommunicationAlice we facemessages the
cryptography channel, secret decrypttheir to
1Chapter meaningthe
basic parties, particular,
(called in a
solution (scramble) useciphertext
considers Classical even on theperformnow
all A to
most insecure
twomessages maintained
to
agree DecBoth
communicate.
can
gráfein in listens possible encryptalgorithm
to Alicethe
messages.
word the conceal
millenia, Consider channel; achieved? and
Bob key
deed, an
send who send
Theand 1.1 By be to the
or A
1.CHAPTERoriginal
INTRODUCTION Dec
cm=
) en algorithm
illusmessage m. except
channelin
message algorithm
they informa
additional andtheto Kerchoff
whatapproaches,
Enc,
Dec),
private-key message
4 is which thatitis
Bob everyone-and
the this m harder
was by
the encoded
Gen picture, about this what
retrieve original an k historic
encodes
insecure key
algorithm; idea formulated
(Gen,
in the anything
consider is the
by
involved the addressed theadversary,
and the Alice thethe to In
algorithms,
generated thereceives generate
In recover must
key-generationknownsecret.private;principle
ciphertext over learn messages.
steps Bob.Later, be
1.11
Private-Key
Encryption
we to keptthree
Gen and it Bobto not to keptthe
"public"i.e.,
thebe "land-line."
sends k task, Bob needs to design
the must
Alice keydoes
airwaves. decrypt "private"i.e.,
of and theand all weregive
decrypt Illustration
k to the Eve above that obscurity,
A
key called
Alice k we
given c using andguestion key scheme.
a green the eavesdropper
ciphertext perhaps
its
length. the be information
to First, Gen,
by
key privately
a
it
over
decodes formnalizeencrypt to
be
by generated
executed
Alice c=
Enc,(m) 2.1: with
cryption. case,
algorithm, firstneeds security the
to
the message. a
Figure into
trated to A needs break
uses and andThe
this use tion i.e. theless
m To is
2
i.1. ClassicalCryptography: Hidden Writing 3
4. For all m e M,
making
her (revealing this could change his future chances of
Alice love him). Stating it formallv. if LOVE and NO-LOVE were ne
function
inputs and MATCH and NO-MATCH were the outputs, the
they warnt to compute is:
f(LoVE, LOvE) MATCH
f(LOVE, NO-LOVE) = NO-MATCH
f(NO-LOVE, LOVE) =NO-MATCH
f(NO-LOVE, NO-LOVE) = NO-MATCH
The protocol: ASsume that Alice and Bob have access to five
cards, three identical hearts() and two identical clubs(). Alice
and Bob each get one heart and one club and the remaining heart
is put on the table face-down.
Next Alice and Bob also place their cards on the table, also
turned over. Alice places her two cards on the left of the heart
which is already on the table, and Bob places his two cards on
the right of the heart. The order in which Alice and Bob place
their two cards depends on their input as follows. If Alice loves,
then Alice places her cards as O; otherwise she places them as
a . Bob on the other hand places his card in the opposite order:
if he loves, he places , and otherwise places . These orders
are illustrated in Fig. 1.
When all cards have been placed on the table, the cards are
piled up. Alice and Bob then each take turns to privately cut the
pile of cards once each so that the other person does not see how
the cut is made. inally, all cards are revealed. If there are three
hearts in arow then there is a match and no-match otherwise.
Alice Bob
INPUTS INPUTS
LOVE
LOVE
NO-LOVE NO-LOVE
LOVE, LOVE
NO-LOVE, LOVE
NO-LOVE, NO-LOVE
Zero-knowledge proofs
Zero knowledge proofs is a special case of a secure computation.
Informally, in a Zero Knowledge Proof there are two parties,
Alice and Bob. Alice wants to convince Bob that some statement
CHAPTER 1. INTRODUCTION
10
bTheorem 12.3 A
private-key encryption scheme is perfectly secret if
and only if it is Shannon secret.
and expanded to
Pr [Enca(m) == m'"EM
k,m
E Pr [m = m"] Pr (Enc (m") =)
k
m"EM
EP m= m"] Pr (Enca(m') =c]
This last term can now be moved out of the summation and
simplified as:
Pr [Enca(m') = m"eM
k E Prm (m=m"]=Pr [Enca(m) =d.
Analogously,
Pr m=m2 | Enck(m) = c = Pr; Enc (m2) = c
k,m
Prkm Enc (m) = c
Cancelling and rearranging terms, we conclude that
Pr (k t K; Enck(m1)=c:m1 E Dec(c)) =1
but
Pr (k +- K; Enck(m1) =c:m e Dec(c)) <1-e
The first equation follows directly from the definition of private
key encryption, whereas the second equation follows from the
fact that (by the proof of Shannon's theorem) there exists some
key k for which Encg (m1) = c, but n2 ¢ Dec(c). Consider, now, a
scenario where Alice uniformlypicks a message m from {n1, M2}
and sends the encryption of m to Bob. We claim that Eve, having
1.3. Shannon's Treatment of Provable Secrecy 17
Thus we have exhibited a concise attack for Eve which allows her
to guess which message Alice sends with probability better than
2"-1 1
Pr [n' {0,1}"; c+- Enc (m1) : m' e Dec(c)) < 2n
CHAPTER 1. INTRODUCTION
18