Cpsc 467a: Cryptography and Computer Security Notes 3 (rev. 2) Lecture Notes 3 13 Caveats with Perfect Secrecy
نویسنده
چکیده
In Section 12, we saw how a seemingly minor change in a cryptosystem changed it from one that had perfect secrecy to one that leaked a considerable amount of information to Eve. Perfect secrecy, while perhaps difficult to obtain, might seem like the ideal that one should strive for. We make two observations to show that even a scheme with perfect secrecy is not without defects and must still be used carefully. First of all, our simplified Caesar cipher succumbs immediately to a known plaintext attack, since if one knows even a single plaintext-ciphertext pair (m 1 , c 1), one can easily solve the equation c 1 = E k (m 1) = (m 1 + k) mod 3 to find the key k = (c 1 − m 1) mod 3. Hence, any subsequent ciphertext c = E k (m) is immediately decrypted using D k () and the system is completely broken. Second, a system with perfect secrecy can be subject to a modification attack whereby an attacker who can both read and alter messages en route can modify the contents of a message in specific semantically-meaningful ways even though he has no idea what the message actually is. We refer to such an active attacker as " Mallory " , and we call such an attack a man-in-the-middle attack. Here's what Mallory could do to the one-letter Caesar cipher (where we now return to the original version that works over the full 26-letter alphabet). Suppose Alice sends c to Bob. Mallory intercepts it and changes c to (c + 5) mod 26. Even though he doesn't know the key and cannot read m, he knows that his change will alter m in a similar way, changing m to (m + 5) mod 26. Why? Let's do the calculations, where all arithmetic is done modulo 26: D k (c) = D k (c + 5) = c + 5 − k = D k (c) + 5 = m + 5. Depending on the application, this could be a devastating attack. Suppose Alice were a financial institution that was making a direct deposit of m thousand dollars to Mallory's bank account at the Bob bank. By this attack, Mallory could get an extra 5 thousand dollars put into his account each month. For another application, note that the English vowels are all represented by even numbers in …
منابع مشابه
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings
security protocols 11th international workshop cambridge uk april 2-4 2003 revised selected papers lecture notes in computer science security and cryptology PDF
متن کاملProgress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings
information security practice and experience 10th international conference ispec 2014 fuzhou china may 5-8 2014 proceedings lecture notes in computer science security and cryptology PDF advances in cryptology-asiacrypt 96 international conference on the theory and applications of crypotology and information security kyongju lecture notes in computer science PDF image analysis 17th scandinavian ...
متن کاملInformation Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
Interestingly, information hiding 9th international workshop ih 2007 saint malo france june 11 13 2007 revised selected papers lecture notes in computer science security and cryptology that you really wait for now is coming. It's significant to wait for the representative and beneficial books to read. Every book that is provided in better way and utterance will be expected by many peoples. Even...
متن کاملFinancial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers
Any books that you read, no matter how you got the sentences that have been read from the books, surely they will give you goodness. But, we will show you one of recommendation of the book that you need to read. This financial cryptography and data security 12th international conference fc 2008 cozumel mexico january 28 31 2008 revised selected papers lecture notes in computer science is what w...
متن کاملEmbedded Systems Hardware For Software Engineers
embedded systems and software validation morgan kaufmann series in systems on silicon PDF embedded systems security practical methods for safe and secure software and systems development PDF embedded systems architecture second edition a comprehensive guide for engineers and programmers PDF embedded software development for safety-critical systems PDF making embedded systems design patterns for...
متن کامل