You are on page 1of 9

Online Cryptography Course

Dan Boneh

Introduction
What is
cryptography?

Dan Boneh

Crypto core

Talking
to Alice

Talking
to Bob

Secret key establishment:

Alice

Bob

attacker???

Secure communication:

m1

m2
confidentiality and integrity

Dan Boneh

But crypto can do much


more

Digital signatures

Anonymous communication
Alice
signature

Who did I
just talk to?

Alice

Bob

Dan Boneh

But crypto can do much


more

Digital signatures

Anonymous communication
Anonymous digital cash
Can I spend a digital coin without anyone knowing who I
am?
Who
How to prevent double spending?
was

1$

Alice

Internet

(anon. comm.)

that?

Dan Boneh

Protocols
Elections
Private auctions

Dan Boneh

Protocols
Elections
Private auctions

oal: compute f(x1, x2, x3, x4)

trusted
authorit
y

Thm: anything the can done with trusted auth. can also
be done without
Secure multi-party computation

Dan Boneh

Crypto magic
Privately outsourcing computation
search
query

What did
she search
for?

E[ query ]

Alice

E[ results ]
results

Zero knowledge
N=pq

Alice

(proof of knowledge)

???

I know the factors of N !!


proof

Bob

Dan Boneh

A rigorous science
The three steps in cryptography:
Precisely specify threat model
Propose a construction
Prove that breaking construction under
threat mode will solve an underlying hard
problem

Dan Boneh

End of Segment

Dan Boneh

You might also like