Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers”...
-
Upload
margery-williams -
Category
Documents
-
view
221 -
download
0
Transcript of Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers”...
![Page 1: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/1.jpg)
Dan Boneh
Symmetric Encryption
HistoryCrypto
![Page 2: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/2.jpg)
Dan Boneh
History
David Kahn, “The code breakers” (1996)
![Page 3: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/3.jpg)
Dan Boneh
Symmetric Ciphers
![Page 4: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/4.jpg)
Dan Boneh
Few Historic Examples (all badly broken)
1. Substitution cipher
k :=
![Page 5: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/5.jpg)
Dan Boneh
Caesar Cipher (no key)
![Page 6: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/6.jpg)
What is the size of key space in the substitution cipher assuming 26 letters?
¿𝒦 | = 26
¿𝒦 | = 226
26 factorial)
¿𝒦 | = 262
![Page 7: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/7.jpg)
How to break a substitution cipher?
What is the most common letter in English text?
“X”“L”“E”“H”
![Page 8: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/8.jpg)
Dan Boneh
How to break a substitution cipher?
(1) Use frequency of English letters
(2) Use frequency of pairs of letters (digrams)
![Page 9: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/9.jpg)
Dan Boneh
An ExampleUKBYBIPOUZBCUFEEBORUKBYBHOBBRFESPVKBWFOFERVNBCVBZPRUBOFERVNBCVBPCYYFVUFOFEIKNWFRFIKJNUPWRFIPOUNVNIPUBRNCUKBEFWWFDNCHXCYBOHOPYXPUBNCUBOYNRVNIWNCPOJIOFHOPZRVFZIXUBORJRUBZRBCHNCBBONCHRJZSFWNVRJRUBZRPCYZPUKBZPUNVPWPCYVFZIXUPUNFCPWRVNBCVBRPYYNUNFCPWWJUKBYBIPOUZBCUIPOUNVNIPUBRNCHOPYXPUBNCUBOYNRVNIWNCPOJIOFHOPZRNCRVNBCUNENVVFZIXUNCHPCYVFZIXUPUNFCPWZPUKBZPUNVR
B 36
N 34
U 33
P 32
C 26
E
T A
NC 11
PU 10
UB 10
UN 9
IN AT
UKB 6
RVN 6
FZI 4
THE
digrams
trigrams
![Page 10: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/10.jpg)
Dan Boneh
2. Vigener cipher (16’th century, Rome)
k = C R Y P T O C R Y P T O
m = W H A T A N I C E D A Y T O D A Y
C R Y P T (+ mod 26)
c = Z Z Z J U C L U D T U N W G C Q S
suppose most common = “H” first letter of key = “H” – “E” = “C”
![Page 11: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/11.jpg)
Dan Boneh
3. Rotor Machines (1870-1943)
Early example: the Hebern machine (single rotor)
ABC..XYZ
KST..RNE
EKST..RN
NEKST..Rkey
![Page 12: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/12.jpg)
Dan Boneh
Rotor Machines (cont.)
Most famous: the Enigma (3-5 rotors)
# keys = 264 = 218
![Page 13: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/13.jpg)
Dan Boneh
4. Data Encryption Standard (1974)
DES: # keys = 256 , block size = 64 bits
Today: AES (2001), Salsa20 (2008) (and others)
![Page 14: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/14.jpg)
Dan Boneh
END END END
![Page 15: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/15.jpg)
Consider the weight update:
Which of these is a correct vectorized implementation?
![Page 16: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/16.jpg)
Suppose q is at a local minimum of a function. What will one iteration of gradient descent do?
Leave q unchanged.
Change q in a random direction.
Move q towards the global minimum of J(q).
Decrease q.
![Page 17: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/17.jpg)
Fig. A corresponds to a=0.01, Fig. B to a=0.1, Fig. C to a=1.
Fig. A corresponds to a=0.1, Fig. B to a=0.01, Fig. C to a=1.
Fig. A corresponds to a=1, Fig. B to a=0.01, Fig. C to a=0.1.
Fig. A corresponds to a=1, Fig. B to a=0.1, Fig. C to a=0.01.
![Page 18: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/18.jpg)
![Page 19: Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)](https://reader036.fdocuments.us/reader036/viewer/2022062304/56649efc5503460f94c0fde5/html5/thumbnails/19.jpg)