CSE 594 : Modern Cryptography 30 March 2017 Lecture 1 : Public Key Encryption : II
نویسندگان
چکیده
2 DDH Problem Definition : {x← Z∗ p , y ← Z∗ p : (gx, gy, gxy)} ≈c {x← Z∗ p , y ← Z∗ p , z ← Z∗ p : (gx, gy, gz)} DDH problem states that the above two tuples are completely indistinguishable. Zp = {0, 1, ..., p− 1} where p is a very large prime and Z∗ p contains all non-zero elements in above set such that gcd(x, p) = 1. gxy which is dependant of x and y looks totally indistinguisable from a completely random number gz. Since |Z∗ p | is p − 1 which is not prime makes the problem easier in some cases and taking discrete logs also becomes easy. The way around was to work with safe primes. We work with prime order sub-group of Z∗ p by picking a safe prime p = 2q + 1 where q is also prime and g = x 2 for a random x ∈ Z∗ p . In general you can work with any prime order subgroup of Z∗ p . Let Gq is the group generated by g = {g0, g1, ..., gq−1} and size of the group is q. So now instead of picking up elements directly from Z∗ p , if you pick up x and y from Gq and then compute the values for the tuple the problem becomes hard.
منابع مشابه
CSE 599 b : Cryptography ( Winter 2006 ) Lecture 12 : Public Key ( Asymmetric ) Encryption
One way to use Diffie-Hellman’s 1976 secret key exchange protocol is to create a key to be used in later rounds for symmetric encryption. This requires multiple rounds of communication. Rivest, Shamir, and Adleman in 1978 developed the one round communication scheme discussed earlier. Namely, in order for Bob to receive messages Bob produces an integer N = pq where p and q are primes of equal l...
متن کاملLecture Notes on Part Ii of Introduction to Cryptography
1.1. Why do we need probabilistic encryption? The point of probabilistic encryption is to eliminate any information leaked with public-key cryptography. Assuming a cryptanalyst has a ciphertext C = Ek(M) of message M encrypted with public key Ek and he wants to recover message M. If he guesses correctly a random message M' such that C 0 = Ek(M ) and C'=C, then he knows that M'=M. If it's wrong,...
متن کاملK — Advanced Topics in Cryptography February 5 , 2004 Lecture 4
The focus of this lecture is efficient public-key encryption. In the previous lecture, we discussed a public-key encryption scheme for 1-bit messages. However, to encrypt an `-bit message, we can simply encrypt ` one-bit messages and send these (and we proved last time that this remains secure in the case of public-key encryption). Here, we first describe (briefly) how to combine public and pri...
متن کاملLecture 17 : Constructions of Public - Key Encryption
In the previous lecture, we defined Public-Key Encryption system. We now proceed to define security in these systems. Intuitively, we would like the encryptions of different messages to be indistinguishable, even when the public key is known by the adversary. be a Public-Key Encryption system over the message space M. (Gen, Enc, Dec) is said to be secure, if for all p.p.t. A there exists a negl...
متن کاملCS 5431 – Computer Security Practicum Spring 2017 Lecture 5 : Key Management
So far, you have seen an overview of the basic cryptographic protocols that are used to secure a variety of modern systems. In 5430, you talked about symmetric encryption (e.g., AES), asymmetric encryption (e.g., RSA, El Gamal), hybrid encryption, MACs, digital signatures, and key agreement protocols. This means you are now familiar with many of the essential cryptographic building blocks that ...
متن کامل