dan boneh symmetric encryption history crypto. dan boneh history david kahn, “the code breakers”...

19
Dan Boneh Symmetric Encryption History Crypt o

Upload: margery-williams

Post on 13-Jan-2016

225 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

Symmetric Encryption

HistoryCrypto

Page 2: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

History

David Kahn, “The code breakers” (1996)

Page 3: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

Symmetric Ciphers

Page 4: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

Few Historic Examples (all badly broken)

1. Substitution cipher

k :=

Page 5: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

Caesar Cipher (no key)

Page 6: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

What is the size of key space in the substitution cipher assuming 26 letters?

¿𝒦 | = 26

¿𝒦 | = 226

26 factorial)

¿𝒦 | = 262

Page 7: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

How to break a substitution cipher?

What is the most common letter in English text?

“X”“L”“E”“H”

Page 8: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

How to break a substitution cipher?

(1) Use frequency of English letters

(2) Use frequency of pairs of letters (digrams)

Page 9: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

An ExampleUKBYBIPOUZBCUFEEBORUKBYBHOBBRFESPVKBWFOFERVNBCVBZPRUBOFERVNBCVBPCYYFVUFOFEIKNWFRFIKJNUPWRFIPOUNVNIPUBRNCUKBEFWWFDNCHXCYBOHOPYXPUBNCUBOYNRVNIWNCPOJIOFHOPZRVFZIXUBORJRUBZRBCHNCBBONCHRJZSFWNVRJRUBZRPCYZPUKBZPUNVPWPCYVFZIXUPUNFCPWRVNBCVBRPYYNUNFCPWWJUKBYBIPOUZBCUIPOUNVNIPUBRNCHOPYXPUBNCUBOYNRVNIWNCPOJIOFHOPZRNCRVNBCUNENVVFZIXUNCHPCYVFZIXUPUNFCPWZPUKBZPUNVR

B 36

N 34

U 33

P 32

C 26

E

T A

NC 11

PU 10

UB 10

UN 9

IN AT

UKB 6

RVN 6

FZI 4

THE

digrams

trigrams

Page 10: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

2. Vigener cipher (16’th century, Rome)

k = C R Y P T O C R Y P T O

m = W H A T A N I C E D A Y T O D A Y

C R Y P T (+ mod 26)

c = Z Z Z J U C L U D T U N W G C Q S

suppose most common = “H” first letter of key = “H” – “E” = “C”

Page 11: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

3. Rotor Machines (1870-1943)

Early example: the Hebern machine (single rotor)

ABC..XYZ

KST..RNE

EKST..RN

NEKST..Rkey

Page 12: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

Rotor Machines (cont.)

Most famous: the Enigma (3-5 rotors)

# keys = 264 = 218

Page 13: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

4. Data Encryption Standard (1974)

DES: # keys = 256 , block size = 64 bits

Today: AES (2001), Salsa20 (2008) (and others)

Page 14: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh

END END END

Page 15: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Consider the weight update:

Which of these is a correct vectorized implementation?

Page 16: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Suppose q is at a local minimum of a function. What will one iteration of gradient descent do?

Leave q unchanged.

Change q in a random direction.

Move q towards the global minimum of J(q).

Decrease q.

Page 17: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Fig. A corresponds to a=0.01, Fig. B to a=0.1, Fig. C to a=1.

Fig. A corresponds to a=0.1, Fig. B to a=0.01, Fig. C to a=1.

Fig. A corresponds to a=1, Fig. B to a=0.01, Fig. C to a=0.1.

Fig. A corresponds to a=1, Fig. B to a=0.1, Fig. C to a=0.01.

Page 18: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)
Page 19: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)