+ All Categories
Home > Documents > The One Time Pad

The One Time Pad

Date post: 22-Feb-2016
Category:
Upload: lee
View: 41 times
Download: 0 times
Share this document with a friend
Description:
Online Cryptography Course Dan Boneh. Stream ciphers. The One Time Pad. Symmetric Ciphers: definition. Def : a cipher defined over is a pair of “efficient” algs ( E , D ) where E is often randomized. D is always deterministic. - PowerPoint PPT Presentation
14
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh
Transcript
Page 1: The One Time Pad

Dan Boneh

Stream ciphers

The One Time Pad

Online Cryptography Course Dan Boneh

Page 2: The One Time Pad

Dan Boneh

Symmetric Ciphers: definitionDef: a cipher defined over

is a pair of “efficient” algs (E, D) where

• E is often randomized. D is always deterministic.

Page 3: The One Time Pad

Dan Boneh

The One Time Pad (Vernam 1917)

First example of a “secure” cipher

key = (random bit string as long the message)

Page 4: The One Time Pad

Dan Boneh

The One Time Pad (Vernam 1917)

msg: 0 1 1 0 1 1 1

key: 1 0 1 1 0 1 0

CT:

Page 5: The One Time Pad

Dan Boneh

You are given a message (m) and its OTP encryption (c).

Can you compute the OTP key from m and c ?

No, I cannot compute the key.

Yes, the key is k = m ⊕ c. I can only compute half the bits of the key.

Yes, the key is k = m ⊕ m.

Page 6: The One Time Pad

Dan Boneh

The One Time Pad (Vernam 1917)

Very fast enc/dec !! … but long keys (as long as plaintext)

Is the OTP secure? What is a secure cipher?

Page 7: The One Time Pad

Dan Boneh

What is a secure cipher?Attacker’s abilities: CT only attack (for now)

Possible security requirements: attempt #1: attacker cannot recover secret key

attempt #2: attacker cannot recover all of plaintext

Shannon’s idea: CT should reveal no “info” about PT

Page 8: The One Time Pad

Dan Boneh

Information Theoretic Security (Shannon 1949)

Def: A cipher (E, D) over () has perfect secrecy if

Page 9: The One Time Pad

Dan Boneh

Information Theoretic Security Def: A cipher (E, D) over () has perfect secrecy if (|) and

Pr[ E(k, m0) = c] = Pr[ E(k, m1) = c] where R

Page 10: The One Time Pad

Dan Boneh

Lemma: OTP has perfect secrecy.Proof:

Page 11: The One Time Pad

Dan Boneh

Let and . How many OTP keys map to ?

None

12

Depends on

Page 12: The One Time Pad

Dan Boneh

Lemma: OTP has perfect secrecy.Proof:

Page 13: The One Time Pad

Dan Boneh

The bad news …

Thm: perfect secrecy ⇒

Page 14: The One Time Pad

Dan Boneh

End of Segment


Recommended