Definition:

  • A triplet of algorithms (Gen, Enc, Dec), a message space , and a key space K together is called a private-key encryption scheme if:
    1. The key-generation algorithm, Gen is a randomized algorithm that returns a key, , such that .
    2. The encryption algorithm, is an algorithm that takes as input a key and a plain-text (the message), and outputs a cipher-text
    3. The decryption algorithm, is an algorithm that takes as input a key and a cipher-text , and output a plain-text .
    4. The scheme is correct; that is, decrypting a valid cipher-text should output the original plain text. Formally we require that for all
  • Worst-case adversary:
    • Computationally unbounded
    • Might know Gen, Enc, Dec but doesnt now the key or their internal randomness
    • But can see the ciphertext
  • Consists of:
    • A triplet of al algorithms Gen, Enc, Dec
      • flowchart LR
          subgraph Alice
          direction LR
          msg1[Message]-->ENC
          end
          ENC --jizberisz--> DEC
          subgraph Bob
          direction LR
          DEC--> msg2[Message]
          end
          sk[SecretKey]
          sk --> ENC
          sk --> DEC
        
    • A message space
    • A key space

Algorithm triplet:

  • Gen
    • Alice and Bob first need to meet in advance to generate and agree on a secret key
      • Secret keys are shared
    • A uses secret key to encrypte a message, becomes a cyber text,
    • A sends cyber message to B, B then decrypt using the agreed secret key
  • Enc
    • Alice has a private message for Bob, she sends over the insecure channel.
  • Dec
    • Once Bob receives the cipher-text , he decrypts it by running to read the original message

Shannon’s perfect secrecy definition:

  • A-posteriori = A-priori
  • seeing the ciphertext should provide absolutely no additional information about the plaintext message.
  • ,
  • Achievable with One-time pad as example
    • but reusing OTP doesnot achieve perfect indistinguishability therefore, not perfect secrecy
    • theorem For any perfectly secure encyption scheme,

Perfect indistinguishability definition:

  • A Turing Test
  • With 2 worlds:
  • Adversary is a distinguisher (sees and tries to guess which world it is in)
  • Perfect indistinguishability means adversary has no way of knowing which world he is in
  • ,

Perfect secrecy and Indistnguishibility

  • theorem An encryption scheme (Gen, Enc, Dec) satisfies perfect seccy IFF it satisfies perfect indisguishability
  • Proof: use conditional probability

Caesar cipher

  • The Caesar Cipher is a private-key encryption schemeclaim

One-time pad

Turing’s code