0 Up votes0 Down votes

0 views11 pagescryptography

Jul 17, 2015

© © All Rights Reserved

PDF, TXT or read online from Scribd

cryptography

© All Rights Reserved

0 views

cryptography

© All Rights Reserved

- The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies
- Steve Jobs
- NIV, Holy Bible, eBook
- NIV, Holy Bible, eBook, Red Letter Edition
- Hidden Figures Young Readers' Edition
- Cryptonomicon
- Make Your Mind Up: My Guide to Finding Your Own Style, Life, and Motavation!
- The Golden Notebook: A Novel
- Alibaba: The House That Jack Ma Built
- The 10X Rule: The Only Difference Between Success and Failure
- Autonomous: A Novel
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy
- Algorithms to Live By: The Computer Science of Human Decisions
- Console Wars: Sega, Nintendo, and the Battle that Defined a Generation
- The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution

You are on page 1of 11

Debdeep Mukhopadhyay

Assistant Professor

Department of Computer Science and

Engineering

Indian Institute of Technology Kharagpur

INDIA -721302

Objectives

A Communication Game

Concept of Protocols

Magic Function

Cryptographic Functions

A Communication Game

Alice and Bob are the two most

famous persons in cryptography.

They are used every where

Consider a scenario, where Alice and

Bob wishes to go for dinner together.

Alice decides to go for Chinese,

whereas Bob wants to go for Indian

Food.

Now how do they resolve?

Alice tosses a coin (with his hands

covering the coin) and asks Bob of

his choice: HEADS or TAILS

If Bobs choice matches with the

outcome of the toss, then they go

for Indian food. Else Alice has in

her way.

Consider the situation when both

of them are far apart and

communicate through a telephone.

What is the problem?

Bob cannot trust Alice, as Alice can tell

a lie.

How do we solve this problem?

(plural number of players) are called

technically protocols

In order to resolve the problem, both

Alice and Bob engage in a protocol.

They use a magic function, f(x)

Properties of f(x)

Assume, Domain and Range of f(x)

are the set of integers

1. For every integer x, it is easy to

compute f(x) from x. But given f(x) it

is hard to compute x, or find any

information about x, like whether x

is even or odd (one-wayness)

2. It is impossible to find a pair of

distinct integers x and y, st. f(x)=f(y)

The Protocol

Both of them agree on the function

f(x)

an even number x represents HEAD

an odd number x represents TAIL

Alice picks up randomly a large

integer, x and computes f(x)

Bob tells Alice his guess of whether

x is odd or even

Alice then sends x to Bob

Bob verifies by computing f(x)

Security Analysis

Can Alice cheat ?

For that Alice need to create a yx, st

f(x)=f(y). Hard to do.

guess?

Bob listens to f(x) which speaks nothing

of x. So his probability of guess is

(random guess).

Alice and Bob wish to resolve a dispute over

telephone. We can encode the possibilities of the

dispute by a binary value. For this they engage a

protocol:

Alice Bob: Alice picks up randomly an x, which is

a 200 bit number and computes the function f(x).

Alice sends f(x) to Bob.

Bob Alice: Bob tells Alice whether x was even or

odd.

Alice Bob: Alice then sends x to Bob, so that Bob

can verify whether his guess was correct.

If Bob's guess was right, Bob wins.

Otherwise Alice has the dispute

solved in her own way.

They decide upon the following

function, f: X Y,

X is a 200 bit random variable

Y is a 100 bit random variable

A Real Instance of f

The function f is defined as follows:

f(x) = (the most significant 100 bits of

x) V (the least significant 100 bits of

x), x X

Here V denotes bitwise OR.

Bobs Strategy

Bobs Experiment:

Input f(x)

Output Parity of x

Algorithm:

If [f(x)]0=0, then x is even

else x is odd

If X is chosen at random,

Pr[X is even]=Pr[X is odd]=1/2

Pr[Bob succeeds]=Pr[X is even]Pr[Bob

Succeeds|X is even]+Pr[X is

odd]Pr[Bob Succeeds|X is odd]

=+1=

Remember we compute Alices cheating

probability irrespective of Bobs strategy.

Case 1: X is even.

f(x)]0=0, with prob.= . In this case Alice cannot cheat.

f(x)]1=1, with prob.= . In this case Alice can cheat.

Case 2: X is odd.

f(x)]0=0, this is not possible from the

definition of f.

f(x)]0=1. In this case Alice can cheat.

Alice = .

So, Alice can cheat with a prob. of

+=

Throughout the course we shall see

various techniques, methods etc all

aimed at discovering these kind of

functions.

They shall be referred to with various

terms, like:

one-way functions

pseudo-random generators

hash functions

symmetric and a-symmetric ciphers

Practical efficiency

A mathematical problem is efficient

or efficiently solvable when the

problem is solved in time and space

which can be measured by a small

degree polynomial in the size of the

problem.

The polynomial that describes the

resource cost for the user should be

small.

Practical efficiency

Eg, a protocol with the number of

rounds between the users increasing

quadratically with the number of

users, is not efficient

So, we wish protocols/algorithms

which are not only secure but also

efficient.

References

Wenbo Mao, "Modern Cryptography,

Theory and Practice", Pearson

Education (Low Priced Edition)

10

Overview on Modern Cryptography

11

- Building a business with Haskell: Case Studies: Cryptol, HaLVM and CopilotUploaded byDon Stewart
- DBMS EncryptionUploaded byKasser Ismael
- UT Dallas Syllabus for mis6330.501.07s taught by Huseyin Cavusoglu (huseyin)Uploaded byUT Dallas Provost's Technology Group
- 06) Introductory IntegerUploaded bySalmanShah
- cryptoUploaded bySneha Rana
- Survey on Scalable load balancing and Data security in Cloud IaaS serversUploaded byShruti
- Csc112 - Computer Programming 1 Lab Manual 2014Uploaded byRowan Nuguid Elomina
- US Copyright Office: 007Uploaded byUSA_CopyrightOffice
- Use of Cryptography in Data Security over Computer Networks by TigerHATSUploaded byTigerHATS
- ieee wimax securityfulltxtUploaded byAllan K Winter
- Cryptography_and_Network_Security_1Uploaded bySuHasini Madhurya
- Kaizen It003 Midterm Unit3Uploaded byFranz Cantara
- IMC2013 Day2 SolutionsUploaded bytruongvinhlan19895148
- Procure Sharing Of Health Records In Cloud Using Attribute Based EncryptionUploaded byseventhsensegroup
- METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYUploaded byAIRCC - IJNSA
- CISSP 5 CryptographyUploaded byRobert Mota Hawks
- Ice TranUploaded byPeraKojot
- 11AMIKeysUploaded bySalman Habib
- CryptographyUploaded bynooti
- source adjudicationUploaded byDjunari
- Assignment3[1].pdfUploaded bysunnyopg
- Privacy and Security Qn BankUploaded byRamprakash Reddy
- Truths!!!--What they Don't teach in Manuals!!!Uploaded bypaul_17oct@yahoo.co.in
- 4 Implementing Cloud Data SecurityUploaded byParkerAllison
- 3_CISSP Study Guide on CryptographyUploaded byEr Murazor
- EECS-2015-162.pdfUploaded byanil ari
- Secure CRM Cloud Service using RC5 AlgorithmUploaded byseventhsensegroup
- Yearly Lesson Plan MathematicsUploaded bynoorasmah2301
- ABSTRACT.docxUploaded bySreenath Kp
- 06200760Uploaded byGayathri K M

- Kashi Yatra eBookUploaded byAnuradha Shankar
- AntennaUploaded byHenri Dass
- EC2353-QBUploaded byVudattu Raj Vihari
- srichkraUploaded byaishuvc1822
- DSP Lab ManualUploaded byXP2009
- c EssentialsUploaded byREXTERYX
- C-CAT Sample QuestionsUploaded bygurudatt_kulkarni
- cprogramming_mock_test_i.pdfUploaded byKetan Takale
- Basic ConceptsUploaded byaishuvc1822
- 6431Uploaded byaishuvc1822
- CDACUploaded byAbhijit Negi
- (www.entrance-exam.net)-CDAC paper 4.docxUploaded byChhavi Chawla
- A Dom 201400472Uploaded byaishuvc1822
- Triac Vi CharacteristicsUploaded byaishuvc1822
- Differential AllocationUploaded byaishuvc1822
- LED_Scrolling_Display_Project_Working_Wi.pdfUploaded byaishuvc1822
- SHA1Uploaded byaishuvc1822
- Digital Image ProcessingUploaded byaishuvc1822
- An MsgdispUploaded bysab
- AllahabadUploaded byaishuvc1822
- lec8Uploaded byRajib Debnath
- kvlUploaded bySwathi Prasad
- tour progUploaded byaishuvc1822
- 1_1Uploaded byJoshua Bishop
- Kanda Guru Kavacham SanthanandaUploaded byaishuvc1822
- Truth Behind NamaskarUploaded bynavinkapil
- syllabusUploaded bySakthidasan Sankaran
- Ce Cb Cc ConfigurationUploaded byPriya Balakrishnan
- LisaUploaded byAjith

- Chapter 15 Online Acccess_1Uploaded bySIMAR JEET Kheda
- MPLAB XC8 C Compiler User Guide for AVRUploaded bydavi
- Citrixinternals Ica New 140521053339 Phpapp01Uploaded bypravinkumarjk
- Computer Applications [ICSE] Sample Paper 4Uploaded byGuide For School
- Angular 1.0.0rc7Uploaded bylathanhvien
- Zonning CommandUploaded byaminhiren
- Dell FTOS 03a Physical Interface ConfigurationUploaded byBambang Adi
- Cc Boot GameUploaded byJey-r Ventura
- Q&A-MongoDB Performance Benchmark using SandStormUploaded byImpetus
- OSPC Post InstalacionUploaded byPablo Perez
- Renew Portal CertificateUploaded bysusanth853
- 9789352137060_tocUploaded bybalajismith
- Nas and as Security KeyUploaded byVishal Kushwaha
- 7Uploaded byAnca Orăscu
- 7. Entity-Relationship Modeling.pdfUploaded byDaniel Nyagechi
- S501 Get Power From DataPower- Practical ApproachUploaded byJagadeeh Valasapalli
- meltdown.pdfUploaded byDenes Marschalko
- Praveen Resume (1)Uploaded byvinaykksa
- Software Testing ReadingUploaded byAmrita Pradhan
- tmpC0CF.tmpUploaded byFrontiers
- Creating a Custom API or Extending the Core APIUploaded byshireen_2587
- Secure Atm by Image ProcessingUploaded byMastermind Bishyer
- A Quick Introduction to Version Control With Git and GitHubUploaded byestyerkol
- gpsimUploaded byArman
- THE EFFECTIVENESS OF DATA MINING IN QUERY OPTIMIZATIONUploaded byTJPRC Publications
- 802 1x and EAP-Based Authentication Across Congested WAN LinksUploaded by่่jmudyeh
- Sex Book UrduUploaded bysaqib raza
- Getting StartUploaded bykrishnadevanur
- Digital Signal ProcessingUploaded byAswathy p s
- Protein Docking StepsUploaded bysumitsspot-always4032

## Much more than documents.

Discover everything Scribd has to offer, including books and audiobooks from major publishers.

Cancel anytime.