Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

Similar documents
An Introduction to Cryptography

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

LFSR stream cipher RC4. Stream cipher. Stream Cipher

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Sequences and Cryptography

Sherlock Holmes and the adventures of the dancing men

CS408 Cryptography & Internet Security

CSc 466/566. Computer Security. 4 : Cryptography Introduction

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

V.Sorge/E.Ritter, Handout 5

Modern Cryptography: Theory And Practice By Wenbo Mao

New Address Shift Linear Feedback Shift Register Generator

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

Fault Analysis of Stream Ciphers

Stream Ciphers. Debdeep Mukhopadhyay

Institute of Southern Punjab, Multan

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Separating Semantic and Circular Security for Symmetric Key Bit Encryption from LWE. Rishab Goyal Venkata Koppula Brent Waters

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

From Theory to Practice: Private Circuit and Its Ambush

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Encryption. Secure Chat. Encryption Machine

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Sounds of China. Production Digimonk for MEC Sound Effect Library Page 1 / 151 Musicjag

Number Story. From Counting to Cryptography PETER M. HIGGINS COPERNICUS BOOKS. An Imprint of Springer Science+Business Media

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Most people familiar with codes and cryptography have at least heard of the German

Testing of Cryptographic Hardware

NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION

Attacking of Stream Cipher Systems Using a Genetic Algorithm

This is an extended version of:

Ciphers that Substitute Symbols

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Exploring the Enigma [The MATH Connection]

PA Substitution Cipher

Pseudorandom bit Generators for Secure Broadcasting Systems

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Performance Evaluation of Stream Ciphers on Large Databases

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY

Substitution cipher. Contents

How to Predict the Output of a Hardware Random Number Generator

(12) United States Patent (10) Patent No.: US 6,409,089 B1. Eskicioglu (45) Date of Patent: Jun. 25, 2002

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Improved Coercion-Resistant Electronic Elections through Deniable Re-Voting

Image Steganalysis: Challenges

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

EFFICIENT IMPLEMENTATION OF RECENT STREAM CIPHERS ON RECONFIGURABLE HARDWARE DEVICES

Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Multiple Image Secret Sharing based on Linear System

Computer Science 126. Prologue: A Simple Machine. General Computer Science Fall Robert Sedgewick

mcs 2015/5/18 1:43 page 15 #23

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

CRITICAL THINKING 8. CAUSAL ARGUMENTS

Chapter 4: How Universal Are Turing Machines? CS105: Great Insights in Computer Science

SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Revolutionary War On Wednesday (Magic Tree House (R)) PDF

HOURS 7:30 AM - 4:30 PM

On the Construction of Lightweight Circulant Involutory MDS Matrices

Cabinet War Rooms SIGSALY. The A-3 scrambler

Hidden Codes and Grand Designs

Permutation-based cryptography for the Internet of Things

The Swiss cipher machine NeMa

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

Fault Analysis of Stream Ciphers

Algebra (2nd Edition) PDF

CONCEPTUAL METAPHOR. Identify the metaphors: Identify the metaphors: Our ordinary conceptual system is fundamentally metaphorical in nature.

Physical Layer Built-in Security Analysis and Enhancement of CDMA Systems

6.115 KryptoPhone Final Project Report

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

Redwall. Technologies LLC

S. 2 English Revision Exercises. Unit 1 Basic English Sentence Patterns

Nick Psaila International Private Mentoring Personal Leadership Analysis

WG Stream Cipher based Encryption Algorithm

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

Writing maths, from Euclid to today

Decim v2. To cite this version: HAL Id: hal

BeepBeep: Embedded Real-Time Encryption

A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography

Birkhäuser Advanced Texts

Baudot code channels

Securing Scan Design Using Lock & Key Technique

cryptography, plaintext; ciphertext. key,

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm

III Phrase Sampler. User Manual

Name Date Hour. Sound Devices In the poems that follow, the poets use rhyme and other sound devise to convey rhythm and meaning.

Dynasties of Ancient China Lapbook

Transcription:

Perfect Security of the Cipher in the Delphic Model La spatialisation de Poisson de Pharse à Trappes TELECOM ParisTech david.madore@enst.fr http://perso.enst.fr/~madore/ 2008-W14-2 1/16

1 Background on the fourtytwofish cipher of fourtytwofish 2 3 4 5 2/16

of fourtytwofish Belongs to a long line of ciphers by respected cryptographers: Blowfish (B. Schneier, 1993) Twofish (B. Schneier & al, 1998) Threefish (H. Sonnenregner, 1999) broken 1999 Fourfish (H. Sonnenregner, 1999) broken 1999 Fivefish (H. Sonnenregner, 1999) broken 2000 Sixfish (H. Sonnenregner, 2000) broken 2000... Fourtyfish (H. Sonnenregner, 2007) broken 2008 Fourtyonefish (H. Sonnenregner, 2008) broken 2008 (H. Sonnenregner, 2008) Note: some (but not all) were broken. 3/16

What is ordinary? Ordinary Alice uses the cipher to tell Bob a secret The attacker Eve ( eavesdropper ) cannot guess the secret without knowing the encryption key Diagram: Alice Zachary Eve cool, wavy line tells secret Yvonne Bob Note: Yvonne and Zachary have fun with TikZ while Alice tells Bob her meaningless secret. 4/16

What is localized? Now Alice does not tell Bob the secret at all Diagram: Eve nothing Alice Bob 5/16

What is localized? Now Alice does not tell Bob the secret at all Diagram: Eve nothing Alice Bob Much more difficult: ever try to keep a secret for yourself? 5/16

aims at perfect localized Another cool TikZ picture: Alice plaintext 42fish gossip Alice s boyfriend gibberish Alice s boyfriend s girlfriend (Eve) Bob not Bob... 6/16

design principles Simple and elegant design No unexplained pieces Peer-reviewed on Slashdot.org plaintext stock exchange weather forecast big shark eaten herring S-box MAGIC annoying fine print nowhere ciphertext 7/16

What is an? How an works Question goes in Sacrifice made to gods (or higher powers: computers...) Divinely inspired answer comes out question oracle answer Example: 易經 (made in China) 8/16

What is a random oracle? Cheap plastic imitation of a real oracle, often used in cryptography: fine question random oracle garbage 9/16

What is a random oracle? Cheap plastic imitation of a real oracle, often used in cryptography: fine question random oracle garbage Example: Tell me, O Mighty, tell me the answer to my question: how can I make out with Brad Pitt 1? 1 Replace with Angelina Jolie according to your tastes. 9/16

What is a random oracle? Cheap plastic imitation of a real oracle, often used in cryptography: fine question random oracle garbage Example: Tell me, O Mighty, tell me the answer to my question: how can I make out with Brad Pitt 1? 5d9ba10c8d2d8d6b1b597f11d55cc435237669ae Not very useful! 1 Replace with Angelina Jolie according to your tastes. 9/16

Introducing the Delphic Idea: instead of these useless random, introduce the Delphic in cryptographic proofs. 10/16

Introducing the Delphic Idea: instead of these useless random, introduce the Delphic in cryptographic proofs. Established in Delphi, Greece (circa 8 th century BCE) Presided by priestess of Apollo Respectable reputation Foretold Alexander s conquests, Nero s death, Hadrian s rise as Emperor, etc. 10/16

Use in cryptography Model: fine question bribe Delphic desired answer 11/16

Use in cryptography Model: fine question bribe Delphic desired answer Example: Tell me, O Mighty, tell me the answer to my question: is my cunningly devised cipher unbreakable? 11/16

Use in cryptography Model: fine question bribe Delphic desired answer Example: Tell me, O Mighty, tell me the answer to my question: is my cunningly devised cipher unbreakable? Of course it is, Sir. Now, do you wish to buy a stucco bust of Socrates for only 9.99e? 11/16

Use in cryptography Model: fine question bribe Delphic desired answer Example: Tell me, O Mighty, tell me the answer to my question: is my cunningly devised cipher unbreakable? Of course it is, Sir. Now, do you wish to buy a stucco bust of Socrates for only 9.99e? Much more useful! (...except for the bust of Socrates, which is rather tacky) 11/16

Statement of the main theorem Theorem achieves perfect localized in the Delphic model. 12/16

Statement of the main theorem Theorem achieves perfect localized in the Delphic model. Some techniques used in proof: Long abstruse s from algebraic geometry. Large body of numerical evidence. Vigorous handwaving. Personal communication / divine inspiration. Zero-content proof techniques. The details are left as an exercise. 12/16

The key lemma Assume X is a proper locally pseudo-factorial quasi-gorenstein universally catenary almost everywhere noetherian semi-effective excellent log-scheme with at most Q-divisorial and q-log-canonical singularities, Y f X is flat, crepant and smooth in codimension 2 with Y Cohen-Macaulay, ker[h p (Y, f? (Ω q X/Z n )) H p (Y, f? (Ω q X/Z ) n )] = 0 for some n (for all p, for all q, for some X Z); 13/16

The key lemma Assume then X is a proper locally pseudo-factorial quasi-gorenstein universally catenary almost everywhere noetherian semi-effective excellent log-scheme with at most Q-divisorial and q-log-canonical singularities, Y f X is flat, crepant and smooth in codimension 2 with Y Cohen-Macaulay, ker[h p (Y, f? (Ω q X/Z n )) H p (Y, f? (Ω q X/Z ) n )] = 0 for some n (for all p, for all q, for some X Z); the obvious conclusion follows. Note in terminology: 2 := 1 + 1. 13/16

Applications Expected applications: Patents Lots of money 14/16

Applications Expected applications: Patents Lots of money Applications so far: Talks at prestigious conferences Busts of Socrates, Pericles, etc. (made of stucco) 14/16

References [refneeded] Anonymous (author unknown), Reference needed, (cited in [Wikipedia]). Prestigious author, Prestigious title having nothing to do with, Presitigious journal. God, The Bible. God, personal communication. [Wikipedia] J. Wales & al., Wikipedia, published online. 15/16

The End So long, and thanks for all the fish! (Any questions?) 16/16