Title: Caeser cipher
1Caeser cipher
Example 5 letters are shifted Plaintext
CRYPTOGRAPHY Ciphertext HWDUYTLWFUMD
2Encryption Scheme
An encryption scheme is a tuple (P,C,K, E, D)
such that (1) P is a set. It is called
plaintext space. Its elements are called
plaintexts. (2) C is a set. It is called
ciphertext space. Its elements are called
ciphertexts. (3) K is a set. It is called key
space. Its elements are called key. (4) E
Ekk?K is a family of functions Ek P?C.
Its elements are called encryption functions. (5)
D Dkk?K is a family of functions Dk C?P.
Its elements are called decryption
functions. (6) For each e ?K, there is d ?K such
that Ed(De(p)) p for all p?P.
3Caesar cipher
Plaintext space, Ciphertext space, Key space are
alphabets SA,B,,Z.
We identify the letters A, B, , Z according to
the following table
A B C D E F G H I J K L M N O P Q R S
T U V W X Y Z 0 1 2 3 4 5 6 7 8 9
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Encryption for e?Z26, Ee S?S, x ? (x e) mod
26 Decryption for d?Z26, Dd S?S, x ? (x d) mod
26
4Attack models
- Ciphertext Only Attack
- - The attacker knows ciphertexts and tries to
recover the corresponding plaintexts or the key. - Known Plaintext Attack
- - The attacker knows plaintexts and the
corresponding ciphertexts. He tries to find the
key or to decrypt other ciphertexts. - Chosen Plaintext Attack (CPA)
- - The attacker is able to encrypt
plaintexts but does not know the key. He tries to
find the key used or to decrypt other ciphertext.
- Chosen Ciphertext Attack (CCA)
- - The attacker is able to decrypt
ciphertexts (except the target ciphertext) but
does not know the key used. He tries to find the
key used or to decrypt the target ciphertext.
5Ciphertext Only Attack
m the messages (d secret key )
Ciphertext Only Attack
E(m) ciphertexts
(e public key )
The attacker can know the public key in addition
to ciphertexts for public-key cryptosystems.
6Known Plaintext Attack
m messages
E(m) corresponding ciphertexts
the target messages (d secret key )
Known Plaintext Attack
E(m) target ciphertexts
(e public key )
7Chosen Plaintext Attack
m the message (d secret key )
E(m) a ciphertext
Chosen Plaintext Attack
(e public key )
messages m
Ed(m) ciphertexts
Encryption Oracle
If the attacker can choose new messages dependent
to obtained ciphertexts, it is called the
adaptive chosen plaintext attack.
The chosen plaintext attack is always possible
for the public-key cryptpsystems.
8Chosen Ciphertext Attack
E(m) A target ciphertext
m the message (d secret key )
Chosen Ciphertext Attack
(e public key )
Their decrypted messages
ciphertexts that are not the target.
Decryption Oracle
If the attacker can choose new ciphertexts
dependent to obtained massages, it is called the
adaptive chosen ciphertext attack.
9Chosen Ciphertext Attack (CCA)
Decryption oracle
ciphertext C
Cd mod n
Cd mod n
- An attack example
- (1) Attacker computes A ReC mod n for a random
R in Zn/Z, and sends A to the decryption oracle. - Decryption oracle computes B Ad mod n and send
B back to the attacker. - The attacker computes B/R M mod n and get the
message M.
10Exhaustive Search
E(m) ciphertext
d the secret key
Find D(E(m)) m
all possible secret keys
The attacker tries to find the plaintext by
decrypting the ciphertext HWDUYTLWFUMD with all
the possible 26 keys.
11Exhaustive search for RSA
RSA encryption is deterministic (CMe mod n). We
can check whether M is the message of C.
PIN (1205)
C PINe mod n
Internet banking server
An attacker tries to compute from PIN 0000 to
PIN 9999. It takes within several seconds.
12Bit security
e public key
m message
One-way adversary
Ee(m) cipher text
e public key
mi ith bit of message
One-way bit adversary
Ee(m) cipher text
To break a bit of the message is easier than to
break the whole message.
Semantically secure cryptosystems do not leak any
information about the plaintext.
13Semantically Secure
(1) Algorithm A1, on input pk, finds two message
m0, m1 (find stage).
m0 message
A1
e public key
m1 message
ciphertext of m0 or m1
encryption cE(mb)
random
(2) Algorithm A2, on input m0, m1, c E(mb),
guesses b (guess stage).
A2
b
14Alphabets and Words
We identify alphabet (ASCII symbols) with the
number in Zn 0,1,,n-1.
- Definition 3.4.4, Let S be alphabet.
- A word or string over S is a finite sequence of
symbols from S including - the empty sequence, which is denoted by e and
is called the empty string. - w is the length of a word w.
- S is the set of all words over S including the
empty string. - vow is the concatenation of v and w.
- Sn is the set of all words of length n over S.
An example of a word over S is COLA. The length
of COLA is four. Another word over S is COCA.
The concatenation of COCA and COLA is COCACOLA.
15Der ASCII-Zeichensatz