G22.3033-003 Introduction to Cryptography

نویسنده

  • Ofer H. Gill
چکیده

This lecture begins with a discussion on secret-key and public-key cryptography, and then discusses One-Way Functions (OWF), and their importance in cryptography. Essentially, an OWF is easy to compute, but difficult to invert. A One-Way Permutation (OWP) is an OWF that permutes elements from a set. A Trap-Door Permutation (TDP) is essentially an OWP with certain information, that if disclosed, allows the function to be easily inverted. No OWF is known to exist, since showing the existence of a function that is truly difficult to invert hasn’t been proven yet. However, there exists good candidates for OWF, OWP, and TDP. I’ll describe Prime Product as an example of an OWF candidate, Modular Exponentiation as an example of an OWP candidate, and RSA as an example of a TDP candidate. And, I’ll back up certain proofs with the appropriate number theory. Then, I’ll go on to discuss how the assumption of the existence of OWF leads to a secure password-authentication system. And, I’ll show that S/Key System (an example of password-authentication where the information stored and used for authentication keeps changing) is secure using any OWP. Next, I’ll describe the criticisms made against OWF, OWP, and TDP in practical applications, and give suggestions of how to overcome these criticisms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

G22.3033-013 Exposure-resilient Cryptography

We continue our discussion of Verifiable Secret Sharing, giving two instantiations of the general schema from the last lecture. First, using Commit(x) = g: Feldman VSS, which leaks nothing but g and is perfect binding. Second, using Perdersen’s commitment Commit(x; r) = gh: Pedersen VSS. Next, we turn to the problem of adaptive security. We describe an adaptively secure Feldman VSS using trapdo...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

G22.3033-013 Exposure-resilient Cryptography 2 Proactive Security

Today, we will conclude our discussion of threshold schemes, describing some results from Dodis & Katz (2005). We define proactive security and share refreshing, giving examples for discrete-log based cryptosystems. We describe generic threshhold signature and encryption schemes. We explore Multiple-CCA (MCCA) security and failure of sequential or parallel encryption to acheive it. We give one ...

متن کامل

On the Linear Complexity and Multidimensional Distribution of Congruential Generators over Elliptic Curves

We show that the elliptic curve analogue of the linear congruential generator produces sequences with high linear complexity and good multidimensional distribution.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004