Outline for April 2, 1997
- Greetings and Felicitations
- Please speak into the microphone
- What is cryptography?
- cipher v. code
- plaintext (cleartext) M, ciphertext C, key k
- encryption Ek, decryption Dk
- Requirements for a cryptosystem
- enciphering, deciphering is efficient for all keys
- easy to use
- strength is depends on secrecy of keys only,
not on secrecy of E or D
-
What it can do: Secrecy
- computationally infeasible
to determine Dk from C
even if corresponding M known
-
computationally infeasible to determine M
from C if k unknown
-
What it can do: Data Authenticity (Integrity)
- computationally infeasible
to determine Ek from C
even if corresponding M known
- computationally infeasible to find a
C' such that Dk(C')
is valid plaintext
- Attacks
- ciphertext only
- known plaintext
- chosen plaintext
- chosen ciphertext
-
Measures of strength
- unconditionally secure (theoretically unbreakable)
- conditionally secure (unbreakable in practise);
note environment often affects this
- weak (breakable)
- How to measure strength: Entropy
- Given C, how much uncertainty in M?
- attacker wants 0
- sender wants lg(n), where n is
the length of message
-
Requirements for function
H(p1, ..., pn);
explain these with dice, coins, and (maybe) horses
-
Review probability notation; assume
p1 + ... + pn = 1.
-
H(p1, ..., pn)
is a maximum when
p1 = ... = pn = 1/n.
- For any permutation ¼ (Greek letter pi) on
(1, 2, ..., n),
H(p1, ..., pn)
=
H(p¼(1), ..., p¼(n)).
In other words, H must be a symmetric function of the arguments
p1, ..., pn.
-
H is continuous in its arguments
-
H(p1, ..., pn)
>= 0 and equals 0 only when one of the pi = 1.
-
H(p1, ..., pn, 0) =
H(p1, ..., pn).
-
-
If m and n are positive integers, then
-
Let p = p1 + ... +
pm and q = q1 + ... +
qn,
where each pi
and qj are non-negative; then, if
p and q are positive, with p + q = 1, we must have
-
Only function which does this is
-
Examples
- rate for message of length n is
r = H(X)/n; for English, 1 to 1.5
-
absolute rate: assume all chars are equally likely;
assuming L chars, R = lg L; for English, 4.7
-
redundency D = R - r; for English, 3.2 to 3.7
You can get this document in
Postscript,
ASCII
text,
or
Framemaker
version 5.1.
Notes by Ricardo Anguiano:
[LaTeX]
[Postscript]
[Text]
Send email to
cs253@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 4/9/97