Introduction to Cryptography�- Information Theoretic Crypto
NISHANTH CHANDRAN
What was/is cryptography?
What the summer school will cover
Securely Communicate – �Private Key Encryption Schemes
Alice
Bob
Private Key Encryption (Scenarios)
Keys and Kerckhoff’s Principle�The cipher method must not be required to be secret
Historical Ciphers – Caesar Cipher
Problem 1:
“Key” fixed
De vita Caesarum Divus iulius
Historical Ciphers – �Shift Cipher
Problem 2:
Only 26 options for keys
Brute-force Attack�(or exhaustive search)
Key should be large�enough – say 280 options
De vita Caesarum Divus iulius
Mono-alphabetic Substitution Cipher
Avg. letter frequencies of English-language text
Principles of Modern Cryptography
Private Key Encryption - Defining
Proving Schemes Secure
Generating Randomness
Toy Problem:
�Given coin where Pr[H] = p & Pr[T] = 1-p, �how to obtain unbiased bits 0 and 1? �(i.e. where Pr[0] = Pr[1]?)
Perfectly Secure Private Key Encryption
Keys, Messages, Ciphertexts
Keys, Messages, Ciphertexts
Pr[M = “attack today”] = 0.7
Pr[M = “don’t attack”] = 0.3
Example 1
Example 2
Perfect Secrecy (Claude Shannon)
Shift Cipher is NOT perfectly secure
Perfect Indistinguishability Definition
Perfect Secrecy and Perfect Indistinguishability Definitions are Equivalent
An (equivalent) Game Based Definition
The One-Time Pad (Gilbert Vernam)
One Time Pad is Perfectly Secure
Perfect Indistinguishability 🡪 Perfect Secrecy
Moscow-Washington Hotline �(During the Cold War)�One-Time Pad
Limitations of One Time Pads
Perfect Secrecy �🡪 Long Keys
Shannon’s Theorem
Secret Sharing
Can you construct a (2,2)-secret sharing scheme?
Facts on polynomials
Shamir Secret �Sharing