Grin logo
de en es fr
Boutique
GRIN Website
Publier des textes, profitez du service complet
Aller à la page d’accueil de la boutique › Mathématiques - Théorie des nombres

Security against Chosen-Plaintext Attacks

Titre: Security against Chosen-Plaintext Attacks

Élaboration , 2016 , 10 Pages , Note: 1,7

Autor:in: Matthias Himmelmann (Auteur)

Mathématiques - Théorie des nombres
Extrait & Résumé des informations   Lire l'ebook
Résumé Extrait Résumé des informations

In this discourse, I introduce the reader to the concept of Chosen-Plaintext Attacks, by first defining them and then introducing to some of the properties of encryption schemes secure against Chosen-Plaintext attacks. I then introduce the concept of pseudorandom functions and try to show, how pseudorandom functions or permutations help understanding CPA-security.
The discourse ends with constructing a CPA-secure encryption scheme based on pseudorandom permutations and a proposition that proves its correctness.

Extrait


Table of Contents

1 Flashback

2 Chosen-Plaintext Attacks

3 Pseudorandom Functions

4 Pseudorandom Permutations

5 CPA-Secure Encryption

Objectives and Topics

The primary objective of this work is to introduce the concept of security against chosen-plaintext attacks (CPA) and to demonstrate how to construct a cryptographically secure encryption scheme using pseudorandom functions. The document explores the limitations of deterministic encryption and provides a formal mathematical proof for the security of a randomized construction.

  • Theoretical foundations of Chosen-Plaintext Attacks (CPA)
  • Definition and properties of Pseudorandom Functions (PRF)
  • Distinction between Pseudorandom Functions and Pseudorandom Permutations
  • Construction of a CPA-secure private-key encryption scheme
  • Formal security proofs based on computational indistinguishability

Excerpt from the Book

Constructing a CPA-secure encryption scheme:

Let F be a pseudorandom function. We define a private-key encryptio scheme Π for arbitrary messages of length n as follows:

1. Gen: on input n generates a uniform k ∈ {0, 1}n and outputs it.

2. Enc: given a key k ∈ {0, 1}n and a message m ∈ {0, 1}n, we choose a uniform r ∈ {0, 1}n and output the ciphertext c := (r, Fk(r) ⊕ m)

3. Dec: given k ∈ {0, 1}n and a ciphertext c = (r, s), output the plaintext message m := Fk(r) ⊕ s

First, let us confirm that this encryption scheme is correct, in other words that it holds that Deck(Enck(m)) = m. For that matter we simply calculate, what is being given, only using the associativity of ⊕:

Deck(Enck(m)) = Deck((r, Fk(r) ⊕ m)) = Fk(r) ⊕ (Fk(r) ⊕ m) = (0, 0, . . . , 0) ⊕ m = m

Summary of Chapters

1 Flashback: Reviews the basic eavesdropper model where an adversary passively listens to encrypted communication, establishing the need for stronger security definitions.

2 Chosen-Plaintext Attacks: Introduces the CPA model where an adversary can influence the encryption of messages and formally defines the indistinguishability experiment.

3 Pseudorandom Functions: Defines pseudorandom functions as efficient, keyed functions that are computationally indistinguishable from truly random functions.

4 Pseudorandom Permutations: Extends the concept to permutations and explains the relationship between pseudorandom permutations and block ciphers.

5 CPA-Secure Encryption: Details a concrete construction of a randomized, CPA-secure encryption scheme and provides a formal security proof.

Keywords

Chosen-Plaintext Attack, CPA, Cryptography, Pseudorandom Functions, PRF, Pseudorandom Permutations, Block Cipher, Encryption Scheme, Indistinguishability, Security Proof, Private-Key Encryption, XOR, Adversary, Computational Indistinguishability, Negligible Function

Frequently Asked Questions

What is the fundamental focus of this publication?

The document focuses on achieving security against chosen-plaintext attacks (CPA) in private-key cryptography, explaining why deterministic encryption is insufficient.

What are the primary thematic fields covered?

The work covers cryptographic security definitions, the formalization of pseudorandom functions and permutations, and the practical construction of secure encryption systems.

What is the central research question?

The main question is how to design an encryption scheme that remains secure even if an adversary can choose and influence the messages being encrypted.

Which scientific method is utilized?

The document employs formal mathematical modeling, the definition of experiments (indistinguishability games), and reduction-based security proofs.

What topics are discussed in the main body?

The main body covers the transition from passive eavesdropping models to CPA models, the mathematical properties of pseudorandom functions, and the construction and verification of a CPA-secure scheme.

Which keywords characterize this work?

Key terms include Chosen-Plaintext Attacks, Pseudorandom Functions, Indistinguishability, and Private-Key Encryption.

What is the specific role of the XOR operation in the proposed scheme?

The XOR operation is used to combine the message with the output of the pseudorandom function applied to a random value, effectively masking the message to ensure CPA security.

Why is randomization necessary for CPA-secure encryption?

Randomization ensures that the same message encrypted multiple times yields different ciphertexts, preventing an adversary from identifying patterns or predicting the encryption of specific messages.

How does the author define a "strong" pseudorandom permutation?

A strong pseudorandom permutation is one that remains indistinguishable from a uniform permutation even when the adversary is given oracle access to the inverse of the function.

What is the purpose of the provided security proof in the appendix?

The appendix outlines a standard template for security proofs, demonstrating that replacing a pseudorandom function with a truly random one does not significantly alter the adversary's success probability.

Fin de l'extrait de 10 pages  - haut de page

Résumé des informations

Titre
Security against Chosen-Plaintext Attacks
Université
Free University of Berlin  (Fachbereich für Mathematik und Informatik)
Cours
Kryptografie Seminar
Note
1,7
Auteur
Matthias Himmelmann (Auteur)
Année de publication
2016
Pages
10
N° de catalogue
V351992
ISBN (ebook)
9783668385863
ISBN (Livre)
9783668385870
Langue
anglais
mots-clé
encryption scheme security CPA chosen-plaintext encryptions decryptions crypto cryptography discourse
Sécurité des produits
GRIN Publishing GmbH
Citation du texte
Matthias Himmelmann (Auteur), 2016, Security against Chosen-Plaintext Attacks, Munich, GRIN Verlag, https://www.grin.com/document/351992
Lire l'ebook
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
Extrait de  10  pages
Grin logo
  • Grin.com
  • Expédition
  • Contact
  • Prot. des données
  • CGV
  • Imprint