algebraic structures and its applications in cryptography
play

Algebraic Structures and its Applications in Cryptography Dr. - PowerPoint PPT Presentation

Algebraic Structures and its Applications in Cryptography Dr. Sucheta Chakrabarti Scientist - G Scientific Analysis Group DRDO Delhi E-mail suchetadrdo@hotmail.com IC-W 2020 29/8/2020 Outline of the Presentation Secure


  1. Algebraic Structures and its Applications in Cryptography Dr. Sucheta Chakrabarti Scientist - G Scientific Analysis Group DRDO Delhi E-mail – suchetadrdo@hotmail.com IC-W 2020 29/8/2020

  2. Outline of the Presentation • Secure Communication & Cryptography • Role of probability and entropy in secure communication from information theoretic approach • Commonly used Algebraic Structures in Cryptography • New Direction of (in) Cryptography based on Non-commutative / Non- associative Algebraic Structures • Quaigroups • Quasigroup – Based Transformations and its cryptographic applications 29/8/2020 IC-W 2020

  3. Secure Communications Over Open Channels Aim :  To Protect Information  To coordinate operations ( command and control )  To carry out online business transaction ( E- commerce ) Service required for secure communication – • Data confidentiality : It ensures the privacy of data i.e only the authorized person can only access the information • Data Integrity : It ensures the protection from any unauthorized alteration i.e. no insertion, deletion or modification has been done in the information by Non-legitimate party .It provides the assurance that the data is present in its original form as it was sent by the sender. 29/8/2020 IC-W 2020

  4. • Data availability : This means that the data is always available for access whenever required • Authentication : This ensures that the communication is being held among the right individuals. • Non-repudiation : According to this, the sender or the receiver cannot deny being responsible for the data being transmitted . 29/8/2020 IC-W 2020

  5. Fundamental building block of security is Cryptography 1949 is the turning point for cryptography – it turns to scientific based on mathematical grounds by the research article Communication Theory of secrecy system - C.E. Shannon 29/8/2020 IC-W 2020

  6. • Security needs continuous improvement / up gradation against adversary capabilities viz. (i) computational • Computationally unbounded – Unconditional security ( Info. theoretical or perfect secrecy ) • Computationally bounded – Computational security & Provable security ( the cryptographic primitive reduced to certain problem which is proved to be (well known )hard problem . It implies breaking of the primitive computationally infeasible ) (ii) other capabilities - • Active - can corrupt parties, inject / modify messages • Passive / eavesdropper – only listens (intercepts) messages • Other resources i.e. ability to decrypt some messages. • Security is based on Arbitrary Adversary Principle (AAP ) – i.e it assume restrictions on adversary capabilities , but not that the adversary is using specific strategies or attacks • Secure electronic identities and information protection are key for digital evolution 29/8/2020 IC-W 2020

  7. In the Modern digital world Cryptography ( Crypto-primitives / algorithms ) deals with information security & secure communications over insecure channels. Mainly deals with Confidentiality , Authenticity , Integrity & Non-repudiation It needs set of elements and specific operations that are applied to the elements of the set is called Algebraic Structures 29/8/2020 IC-W 2020

  8. Basic Components of Cryptography  Functions • one – one • one-way • trapdoor one way • encryption / decryption 29/8/2020 IC-W 2020

  9. Encryption/Decryption function has to satisfy the following condition : For E ∈ E and 𝑙 𝑓 ≡ 𝑓 ∈ 𝒧 , 𝐹 𝑓 : ℳ → 𝒟 is a 1-1 mapping & so there exists a corresponding D ∈ D and 𝑙 𝑒 ≡ 𝑒 ∈ 𝒧 such that 𝐸 𝑒 : 𝒟 → ℳ and 𝐸 𝑒 𝐹 𝑓 𝑛 = 𝑛 𝑔𝑝𝑠 𝑏𝑚𝑚 𝑛 ∈ ℳ In other words Cryptographic Algorithms - consist of ℳ , 𝒟 , 𝒧 and set 𝐹 𝑓 , 𝑓 ∈ 𝒧 of encryption transformations and corresponding set 𝐸 𝑒 , 𝑒 ∈ 𝒧 of decryption transformations with the property that for −1 i.e each 𝑓 ∈ 𝒧 there exists a unique , 𝑒 ∈ 𝒧 s.t 𝐸 𝑒 ≡ 𝐹 𝑓 𝐸 𝑒 𝐹 𝑓 𝑛 = 𝑛 𝑔𝑝𝑠 𝑏𝑚𝑚 𝑛 ∈ ℳ 29/8/2020 IC-W 2020

  10. Domain & Codomain of Encryption / Decryption Functions • Alphabet set - A • Message space - ℳ • Crypt space - 𝒟 • Key space - 𝒧 Set of encryption and decryption functions are denoted by E & D respectively 29/8/2020 IC-W 2020

  11. Cryptosystems Three Sets : Message / Plaintext – ℳ Ciphertext - 𝒟 - 𝒧 Keys 𝐿𝐻, 𝐹, 𝐸 Three randomized algorithms : 𝐿𝐻: 𝑇 ∗ → 𝒧 Key generation Algo Encryption Algo 𝐹: 𝒧 × ℳ → 𝒟 Decryption Algo 𝐸 ∶ 𝒧 × 𝒟 → ℳ For any k ey 𝑙 ∈ 𝒧 and 𝑛 ∈ ℳ holds 𝐸 𝑙 𝐹 𝑙 𝑛 = 𝑛 So a cryptosystem consists of five tuples which represent as ℳ, 𝒟 , 𝒧 , 𝐹, 𝐸 29/8/2020 IC-W 2020

  12. Probability & Entropy Concepts for Secure Communication  The concept of entropy has evolved in probability theory to create information theoretical model for secure communication .  In 1947-48 by classic work of C. Shannon gives birth of Information theory , a new branch in applied probability theory to handle practical problem of communication.  Security generally expressed in terms of probability and amount of information (entropy)  Here we will discuss some important concepts of discrete probabilities Probability Space : 𝕐, 𝑄𝑠 , where • 𝕐 − the sample space which is a finite set of possible outcomes ( events) • 𝑄𝑠 – a function from 𝒬 𝕐 → 0,1 such that 𝑗 𝑄𝑠 𝕐 = 1, 𝑗𝑗 𝑄𝑠 Φ = 0, 𝑗𝑗𝑗 𝑄𝑠 𝑌 ∪ 𝑍 = 𝑄𝑠 𝑌 + 𝑄𝑠 𝑍 if 𝑌 ∩ 𝑍 = Φ ( iv ) 𝑄𝑠 𝑌 ∩ 𝑍 = 𝑄𝑠 𝑌 𝑄𝑠 𝑍 if 𝑌 ∩ 𝑍 = Φ 𝑄𝑠 is called a probability distribution , a probability measure or just a probability 𝑄𝑠 of X ∈ 𝒬 𝕐 determined by 𝑄𝑠 𝑦 ∀ 𝑦 ∈ 𝑌 29/8/2020 IC-W 2020

  13. Joint Probabilities : Two probability spaces viz . 𝕐, 𝑄𝑠 𝕑, 𝑄𝑠 1 2 It can create joint probability space 𝕐 × 𝕑, 𝑄𝑠 where 𝑄𝑠 define as follows : 𝑄𝑠 𝑦, 𝑧 = 𝑄𝑠 𝑦 𝑄𝑠 𝑧 1 2 Conditional Probability • 𝑄𝑠 𝑌 𝑍 = 𝑄𝑠 𝑌 ∩ 𝑍 /𝑄𝑠 𝑍 - only defined if 𝑄𝑠 𝑍 > 0 • 𝑌 and 𝑍 are independent if 𝑄𝑠 𝑌 = 𝑦|𝑍 = 𝑧 = Pr 𝑌 = 𝑦 or 𝑄𝑠 𝑦| 𝑧 = 𝑄𝑠 𝑦 & also 𝑄𝑠 𝑌 = 𝑦 ∩ 𝑍 = 𝑧 = Pr 𝑌 = 𝑦 Pr 𝑍 = 𝑧 ∀𝑦, 𝑧 𝑄𝑠 𝑌 𝑄𝑠(𝑍|𝑌) Bayes Theorem : 𝑄𝑠 𝑌|𝑍 = 𝑄𝑠 𝑍 29/8/2020 IC-W 2020

  14. Random Variables • A random variable 𝑌 is a function from underlying set of probability space ( all possible outcomes 𝕐 ) to some set of values ( some set of 𝒬 𝕐 ) • Given a probability space and a random variable 𝑌 , the probability that the random variable 𝑌 takes value 𝑦 is 𝑄𝑠 𝑥 𝑌 𝑥 = 𝑦 29/8/2020 IC-W 2020

  15. Application to Cryptography for security analysis Plaintext Distribution : • 𝑌 discrete random variable over the plaintext set ℳ • Sender choose 𝑦 from ℳ based on some probability distribution - Let Pr 𝑌 = 𝑦 be the probability that 𝑦 is chosen - This probability may depend on the language Key Distribution: Sender & Receiver agree on a key 𝑙 chosen from a key set 𝒧 • 𝐿 discrete random variable over 𝒧 • Pr 𝐿 = 𝑙 ,the probability that 𝑙𝑓𝑧 𝑗𝑡 𝑙 Note that here Probability space ( Plaintext , Key) 29/8/2020 IC-W 2020

  16. Ciphertext Probability Distribution 𝑍 is a discrete random variable over the set 𝒟 The probability of obtaining a particular ciphertext 𝑧 depends on the probability of Plaintext and key - 𝑄𝑠 𝑧 = σ 𝑦,𝑙|𝑓 𝑙 𝑦 =𝑧 𝑄𝑠 𝑦 𝑄𝑠(𝑙) = σ 𝑙 𝑄𝑠 𝑙 𝑄𝑠(𝑒 𝑙 ( y))  Attacker Aims to determine the plaintext 𝑦 • Attacker’s does not know /observe ciphertext 𝑧 o Probability (a pri riori i probabil ilit ity ) that the plaintext is 𝑦 : 𝑄𝑠 𝑌 = 𝑦 ≡ Pr(𝑦) o It depends on plaintext distribution i.e language characteristics • Attacker’ s knows / observes ciphertext 𝑧 o Probability ( a posterio iori i probabil ilit ity)that the plaintext is 𝑦– 𝑄𝑠 𝑌 = 𝑦|𝑍 = 𝑧 ≡ 𝑄𝑠 𝑦|𝑧 Computation of attacker’s a a posterio ior (c (condit itio ional) l) probabil ilit itie ies • Apply Bayes theorem 29/8/2020 IC-W 2020

  17. 𝑄𝑠 𝑌 = 𝑦|𝑍 = 𝑧 ≡ 𝑄 𝑠 𝑦|𝑧 𝑄𝑠 𝑦 ×𝑄𝑠 𝑧|𝑦 = 𝑄𝑠 𝑧 Here 𝑄𝑠 𝑦 - Probability of the plaintext 𝑄𝑠 𝑧 - Probability of this ciphertext – It ind nduced by probabil ilit ity of f plain intext an and key distr trib ibutio ions 𝑄𝑠 𝑧 = ෍ 𝑄𝑠 𝑦 𝑄𝑠 𝑙 𝑦,𝑙|𝑓 𝑙 𝑦 =𝑧 𝑄𝑠 𝑧|𝑦 - probability that the 𝑧 is obtained for a given 𝑦 depends on the keys which provide such a mapping from plaintext domain (Message space ) to ciphertext domain (Cipher space) - 𝑄𝑠 𝑧|𝑦 = ෍ 𝑄𝑠 𝑙 𝑙|𝑓 𝑙 𝑦 =𝑧 𝑝𝑠𝑒 𝑙 𝑧 =𝑦 29/8/2020 IC-W 2020

Recommend


More recommend