Lecture 1 : Perfect Secrecy and Statistical Authentication
نویسنده
چکیده
• Definition of perfect secrecy • One-time pad and optimality (Shannon's theorem) • Definition of statistical one-time MAC and construction. Historically, cryptography was treated as a practical problem with practical applications. Many of these schemes were insecure due to a lack of a mathematical foundation combined with no understanding of desirable properties in cryptography systems. However, at the time they were good enough due to the limitations of computational power. Modern cryptography has its foundations in mathematical rigor, with definitions of what it means for schemes to be secure. It is more concerned with elegant constructions and simple to describe systems over contrived protocols. In particular, there is an emphasis on the proofs of security. In this class, our focus will be on modern cryptography and provable security. Consider two persons Alice and Bob, who wish to communicate messages of a sensitive nature. However, an eavesdropper by the name of Eve has the ability to read all the messages that pass between Alice and Bob. Despite this, Alice and Bob would still like to be able to communicate in a way that Eve cannot determine what they are saying to each other. This is done via an encryption scheme, which is a set of functions Enc and Dec for encryption and decryption of messages: plaintext m Alice computes c = Enc(m) ciphertext c Bob computes m = Dec(c) m Eve reads c, should not learn m Lecture 1, Page 1
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملConstructing Optimal Authentication Codes with Perfect Multi-fold Secrecy
We establish a construction of optimal authentication codes achieving perfect multi-fold secrecy by means of combinatorial designs. This continues the author’s work (ISIT 2009, cf. [1]) and answers an open question posed therein. As an application, we present the first infinite class of optimal codes that provide two-fold security against spoofing attacks and at the same time perfect two-fold s...
متن کاملA Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secre...
متن کاملInformation Theoretic Authentication and Secrecy Codes in the Splitting Model
In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext. Certain applications require that the aspect of secrecy should hold simultaneously. Ogata–Kurosawa–Stinson–Saido (2004) have constructed optimal splitting authentication codes achieving perfect secrecy for the special c...
متن کاملOne-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
Traditionally, secure one-round key exchange protocols in the PKI setting have either achieved perfect forward secrecy, or forms of deniability, but not both. On the one hand, achieving perfect forward secrecy against active attackers seems to require some form of authentication of the messages, as in signed Diffie-Hellman style protocols, that subsequently sacrifice deniability. On the other h...
متن کامل