Slide01 Intro Crypto
Slide01 Intro Crypto
❁
HKUST, Hong Kong Cryptography and Security
Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Page 1 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Data Confidentiality
Page 2 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Page 3 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Example of Encryption
a, b, c, d, · · · , w, x, y, z
Page 4 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Example of Encryption
. . . .
a b. c . k . l .m . t u v
. . . .
d e . f . n . o .p. w x y
. h. . . .s. z
g i q . r . . j
Page 5 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Data Integrity
Page 6 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Question: If you received a message with alleged sender X, how could you
be sure that the sender is indeed X?
Question: If you sent a message to a receiver Y , how could you be sure
that the receiver indeed received the message?
Remark: Detailed techniques for authentication of a message’s sender will
be introduced later.
Page 7 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Anti-replay
Page 8 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Page 9 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Signer Nonrepudiation
Remark: If I wrote you a letter, saying that I will pay you US$100,000 if
you finish that job for me, I could not deny this offer later because I must
have signed on this letter.
Question: If I sent you an electronic message that orders you to kill
someone, but later denying that I sent you this message, how could you
prove that I indeed sent you this message?
Solution: Digital signature (introduced later).
Signer nonrepudiation: The detection of repudiation of a signature of
signer.
Page 10 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Secret Sharing
Problem: A father has put a lot of treasure into a secure room with an
electronic key k. He has three sons, and would have his three sons to share
the electronic key in some way so that the following conditions are satisfied:
(1) Each of his son has a share (could be a number), which gives zero
information about k.
(2) When any two of his sons come together with their shares, they get no
information at all about the electronic key.
(3) Only when all the three sons come together with their shares, they are
able to recover k with their shares.
How could the father design a system for sharing the electronic key?
Page 11 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Cryptographic Protocols
Page 12 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Page 13 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
History of Cryptography
Page 14 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Page 15 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
Page 16 Version 3
CUNSHENG DING
❁
HKUST, Hong Kong Cryptography and Security
1. Computer Scientists.
2. Mathematicians.
3. Electrical Engineers.
The researchers are working for two sectors:
• the secret sector (military and government organizations),
• the public sector (research institutions and universities).
Page 17 Version 3