Lec 1
Lec 1
Lec 1
425
Foundations of Cryptography
Lecture 1
Instructor
Surya Mathialagan(smathi@mit)
Vinod Vaikuntanathan
(vinodv@mit)
Zero-knowledge
Proofs Public-key Encryption
Digital Signatures
Threshold
Homomorphic Cryptography Pseudorandomness
Encryption
The Intellectual Origins
“Communication Theory of Secrecy Systems” (1945)
preceded
“A Mathematical Theory of Communication” (1948)
which founded Information Theory
Claude E. Shannon
Problems Tools
Security, Math and
Privacy, CRYPTO Theoretical CS
Integrity
Solutions Ideas
6.875 is on https://psetpartners.mit.edu
Administrivia
o Course website, the central point of reference.
https://mit6875.github.io
Bob
Alice
Eavesdropper “Eve”
Key k Key k
Eavesdropper “Eve”
Ciphertext
𝑚←De c(𝑘 ,𝑐 )
Key k Key k
𝑐 ← Enc(𝑘 , 𝑚)
Ciphertext space
Key k Key k
Key space
, ,
,
Pr [ 𝐸 ( K , 𝑚 ) =𝑐]=Pr [𝐸 ( K ,𝑚′ )=𝑐 ]
World 0: World 1:
kK k
𝑐= 𝐸 ( 𝑘 , 𝑚 ) 𝑐 ′ = 𝐸 ( 𝑘, 𝑚 ′ )
WE WANT (SEC): , ,
.
1. Indistinguishability Secrecy
WE KNOW (IND): , ,
WE WANT (SEC): , ,
= (key obs.)
2. Secrecy Indistinguishability
WE KNOW (SEC): , ,
] (because of SEC)
Correctness:
Perfect Secrecy is Achievable
The One-time Pad Construction:
Choose an -bit string k at random, i.e.
, where M is an n-bit message: Output
Output
𝑐 0=𝑚0 ⊕ 𝑘
Key k Key k
A week later:
m1
c
P r ¿
¿ P r ¿
Reusing a One-time Pad?
Claim: One-time Pad does not achieve Perfect
Indistinguishability (and therefore not perfect secrecy).
P r ¿
≠ P r ¿
′ ′
𝐏𝐢𝐜𝐤𝒎𝟎=𝒎𝟏=𝒎,𝒎𝟎 ≠𝒎𝟏 𝐚𝐧𝐝𝒄𝟎=𝒄𝟏=𝒄.
P r ¿
¿ P r [ En 𝑐 ( 𝑘 , 𝑚 ) = 𝑐 ] =1 / 2𝑛
Reusing a One-time Pad?
Claim: One-time Pad does not achieve Perfect
Indistinguishability (and therefore not perfect secrecy).
P r ¿
≠ P r ¿
′ ′
𝐏𝐢𝐜𝐤𝒎𝟎=𝒎𝟏=𝒎,𝒎𝟎 ≠𝒎𝟏 𝐚𝐧𝐝𝒄𝟎=𝒄𝟏=𝒄.
P r ¿
P r ¿
Perfect Secrecy has its Price
THEOREM: For any perfectly secure encryption scheme,
ℳ 𝒞
𝑘 Pick any
𝑚 𝑐
𝑘′
𝑚′ Look at the set of
𝑘′ ′ possible msgs
𝑚′ ′ 𝑘′ ′ ′ ( etc.)
≤|𝓚 |<¿ 𝓜∨¿
~
𝒎 Distinct keys!
Perfect Secrecy has its Price
THEOREM: For any perfectly secure encryption scheme,
ℳ 𝒞
𝑘
𝑚 𝑐
𝑘′ Pr [ 𝐸𝑛𝑐 ( 𝒦 , 𝑚 )=𝑐 ] >0
𝑚′ 𝑘′ ′ Pr [ 𝐸𝑛𝑐 ( 𝒦 ,~
𝑚 )=𝑐 ]=0
𝑚′ ′ 𝑸𝑬𝑫.
≤|𝓚 |<¿ 𝓜∨¿
~
𝒎
So, what are we to do?
RELAX the definition:
EVE is an arbitrary computationally bounded algorithm.
+ number theory/geometry/combinatorics
ZK proofs
Public-key encryption
Pseudorandomness
To Summarize…
• Secure Communication: a quintessential problem in
cryptography.