Information Theory and Security pt' 2 - PowerPoint PPT Presentation

About This Presentation
Title:

Information Theory and Security pt' 2

Description:

She sees the ciphertext C and several security questions arise: ... The trick to information theory results. On the previous , the 'Why? ... – PowerPoint PPT presentation

Number of Views:33
Avg rating:3.0/5.0
Slides: 12
Provided by: wade3
Category:

less

Transcript and Presenter's Notes

Title: Information Theory and Security pt' 2


1
Information Theory and Securitypt. 2
2
Lecture Motivation
  • Previous lecture talked about a way to measure
    information.
  • In this lecture, our objective will be to use
    this concept of information to convey what it
    means to be secure

3
Lecture Outline
  • Probability Review Conditional Probability and
    Bayes
  • Secrecy and Information Theory
  • Probabilistic definitions of a cryptosystem
  • Perfect Secrecy

4
Another way to look at cryptography, pg. 1
  • So far in class, we have looked at the security
    problem from an algorithm point-of-view (DES,
    RC4, RSA,).
  • But why build these algorithms? How can we say we
    are doing a good job?
  • Enter information theory and its relationship to
    ciphers
  • Suppose we have a cipher with possible plaintexts
    P, ciphertexts C, and keys K.
  • Suppose that a plaintext P is chosen according to
    a probability law.
  • Suppose the key K is chosen independent of P
  • The resulting ciphertexts have various
    probabilities depending on the probabilities for
    P and K.

5
Another way to look at cryptography, pg. 2
  • Now, enter Eve She sees the ciphertext C and
    several security questions arise
  • Does she learn anything about P from seeing C?
  • Does she learn anything about the key K from
    seeing C?
  • Thus, our questions are associated with H(PC)
    and H(KC).
  • Ideally, we would like for the uncertainty to not
    decrease, i.e.
  • H(P C) H(P)
  • H(K C) H(K)

6
Another way to look at cryptography, pg. 3
  • Example Suppose we have three plaintexts a,b,c
    with probabilities 0.5, 0.3, 0.2. Suppose we
    have two keys k1 and k2 with probabilities 0.5
    and 0.5. Suppose there are three ciphertexts
    U,V,W.
  • We may calculate probabilities of the ciphertexts
  • Similarly we get pC(V)0.25 and pC(W)0.25

Ek1(a)U Ek1(b)V Ek1(c)W Ek2(a)U Ek2(b)W Ek2
(c)V
7
Another way to look at cryptography, pg. 4
  • Suppose Eve observes the ciphertext U, then she
    knows the plaintext was a.
  • We may calculate the conditional probabilities
  • Similarly we get pP(cV)0.4 and pP(aV)0. Also
    pP(aW)0 , pP(bW)0.6 , pP(cW)0.4.
  • What does this tell us? Remember, the original
    plaintexts probabilities were 0.5, 0.3, and 0.2.
    So, if we see a ciphertext, then we may revise
    the probabilities Something is learned

8
Another way to look at cryptography, pg. 5
  • We use entropy to quantify the amount of
    information that is learned about the plaintext
    given the ciphertext is observed.
  • The conditional entropy of P given C is
  • Thus an entire bit of information is revealed
    just by observing the ciphertext!

9
Perfect Secrecy and Entropy
  • The previous example gives us the motivation for
    the information-theoretic definition of security
    (or secrecy)
  • Definition A cryptosystem has perfect secrecy if
    H(PC)H(P).
  • Theorem The one-time pad has perfect secrecy.
  • Proof See the book for the details. Basic idea
    is to show each ciphertext will result with equal
    likelihood. We then use manipulations like
  • Equating these two as equal and using H(K)H(C)
    gives the result.

Why?
10
The trick to information theory results
  • On the previous slide, the Why? question is
    where all the tricks to information theory reside
  • The basic idea is the following
  • H(X, f(X)) H(X) This means that the joint
    uncertainty of X and some function of X is
    precisely the same as the uncertainty in just X
  • Another way to think of this If you know X, then
    you automatically know f(X), so that doesnt make
    you any more uncertain
  • Back to H(P,K,C)
  • C, the ciphertext, is a function of the plaintext
    P and the key K, i.e. Cf(P,K), for some
    encryption function f
  • Thus, H(P,K,C) H(P,K, f(P,K)) H(P,K)
  • Now, P and K are independent, so H(P)H(K)

11
The second part
  • H(P,K,C) H(P,C) Why?
  • For the one-time pad, P (XOR) K C, so KC (XOR)
    P
  • Thus, P and C uniquely define K, or in other
    words Kg(P,C)
  • Thus, H(P,K,C) H(P,C, g(P,C)) H(P,C)
  • Now, H(P,C) H(PC) H(C) by the chain rule
Write a Comment
User Comments (0)
About PowerShow.com