introduction to modern cryptographyschaffne/mypresentations/... · edward joseph snowden 1983 - ......
TRANSCRIPT
![Page 1: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/1.jpg)
Introduction to Modern Cryptography
Master of Logic
3rd Block: Feb/March 201617
![Page 2: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/2.jpg)
• Historical cryptography & principles of modern cryptography
• perfectly-secret encryption
Outline of the Course
![Page 3: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/3.jpg)
Auguste Kerckhoffs1835 - 1903
• Dutch linguist and cryptographer• Kerckhoffs’ principle: “A cryptosystem should be secure even if everything about the system, except the key, is public knowledge”
• leader of Volapük movement
![Page 4: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/4.jpg)
Claude Elwood Shannon1916 - 2001
• Father of Information Theory• Graduate of MIT• Bell Labs
• juggling, unicycling, chess• ultimate machine
![Page 5: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/5.jpg)
Modern Cryptography• “scientific study of techniques for securing
digital information, transactions and distributed computations”
• crypto is everywhere!
![Page 6: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/6.jpg)
Modern Cryptography• “scientific study of techniques for securing
digital information, transactions and distributed computations”
• crypto is everywhere!
![Page 7: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/7.jpg)
Edward Joseph Snowden1983 -
• former CIA employee and NSA contractor
• whistleblower • on (temporary) asylum in Russia
• Traitor or Hero?
![Page 8: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/8.jpg)
Politics of Cyberwar• In 2013, Snowden leaked many thousand top
secret documents to various media, documenting a
• mass surveillance programs by secret services from all over the world
![Page 9: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/9.jpg)
Politics of Cyberwar
![Page 10: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/10.jpg)
Outline of the Course II
secret key public key
confidentiality private-key encryption
public-key encryption
authenticationmessage
authentication codes (MAC)
digital signatures
![Page 11: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/11.jpg)
Outline of the Course II
secret key public key
confidentiality private-key encryption
public-key encryption
authenticationmessage
authentication codes (MAC)
digital signatures
• reduction proofs• pseudorandomness• block ciphers: DES, AES
![Page 12: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/12.jpg)
Outline of the Course II
secret key public key
confidentiality private-key encryption
public-key encryption
authenticationmessage
authentication codes (MAC)
digital signatures
• reduction proofs• pseudorandomness• block ciphers: DES, AES
• algorithmic number theory• key distribution, Diffie-Hellmann• RSA
![Page 13: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/13.jpg)
Fun Stuff• bitcoin (guest lecture by Marc Stevens, CWI)
• zero-knowledge proofs
• multi-party computation (secret sharing, bit commitment, oblivious transfer)
• electronic voting and auctions
• quantum cryptography
• position-based cryptography
• ...
![Page 14: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/14.jpg)
Jonathan Katz Yehuda Lindell
• 3 Basic Principles of Modern Cryptography
![Page 15: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/15.jpg)
1. Formulation of Exact Definitions
• “a cryptographic scheme is secure if no adversary of a specified power can achieve a specified break”example: encryption
![Page 16: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/16.jpg)
2. Reliance on Precise Assumptions
• unconditional security is often impractical (unfortunate state of computational complexity)
• validation of assumptions (independent of cryptography) example: factoring
• allows to compare crypto schemes
![Page 17: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/17.jpg)
3. Rigorous Proofs of Security
• Intuition is not good enough. History knows countless examples of broken schemes
• bugs vs security holessoftware users vs adversaries
• reduction proofs: Given that Assumption X is true, Construction Y is secure. Any adversary breaking Construction Y can be used as subroutine to violate Assumption X.
![Page 18: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/18.jpg)
Questions ?
![Page 19: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/19.jpg)
Python Programming Project: BibTeX Parser
![Page 20: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/20.jpg)
Python Programming Project: BibTeX Parser
• Block 2 (Nov/Dec), starting asap, 3 ECTS
• Goal: creating the “perfect” bibtex file (for articles in a certain research domain, such as quantum cryptography)
![Page 21: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/21.jpg)
Python Programming Project: BibTeX Parser
• Block 2 (Nov/Dec), starting asap, 3 ECTS
• Goal: creating the “perfect” bibtex file (for articles in a certain research domain, such as quantum cryptography)
• https://github.com/sciunto-org/python-bibtexparser
![Page 22: Introduction to Modern Cryptographyschaffne/mypresentations/... · Edward Joseph Snowden 1983 - ... •Traitor or Hero? Politics of Cyberwar •In 2013, Snowden leaked many thousand](https://reader033.vdocuments.site/reader033/viewer/2022042920/5f6640ca35d56e27c6354c35/html5/thumbnails/22.jpg)
Python Programming Project: BibTeX Parser
• Block 2 (Nov/Dec), starting asap, 3 ECTS
• Goal: creating the “perfect” bibtex file (for articles in a certain research domain, such as quantum cryptography)
• https://github.com/sciunto-org/python-bibtexparser
• extensions to this parser:
• create alphastyle citation keys
• look up article information from crossref, dblp, arXiv
• provide various bibtex file formats
• create a website where articles can be looked up “on the fly”
• …