This is an extended version of:

Similar documents
CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

Sequences and Cryptography

6.115 KryptoPhone Final Project Report

Meanor 1. Put in a prison cell, but one time he could-a been The champion of the world.

Think Like A Leader LEADERSHIP LESSON 11

III Phrase Sampler. User Manual

Activation. Eitan Loewenstein. M

An Introduction to Cryptography

Slide Set 7. for ENEL 353 Fall Steve Norman, PhD, PEng. Electrical & Computer Engineering Schulich School of Engineering University of Calgary

mcs 2015/5/18 1:43 page 15 #23

TheTinderbox. Playstage Junior A comedy adaptation with songs from the Hans Christian Anderson fairy tale

Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection

Lesson 25: Solving Problems in Two Ways Rates and Algebra

Common Human Gestures

KNOCK IT OFF! With Jeff Odie Espenship

What is Poetry? Poetry is a genre. literary work in which special intensity is given to the expression of feelings and ideas.

DIFFERENTIATE SOMETHING AT THE VERY BEGINNING THE COURSE I'LL ADD YOU QUESTIONS USING THEM. BUT PARTICULAR QUESTIONS AS YOU'LL SEE

WEB FORM F USING THE HELPING SKILLS SYSTEM FOR RESEARCH

Poems in Wonderland. Mary Katherine Klaybor South Bend, Indiana

Jerry the Lazy Jaybird

An escalator leading to a fitness center.

Is it possible to just die during sex? You know, just fall over dead. Could pubic lice live in someone s beard? If I wore a glow-in-the-dark condom,

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

Example the number 21 has the following pairs of squares and numbers that produce this sum.

YEDITEPE UNIVERSITY DEPARTMENT OF COMPUTER ENGINEERING. EXPERIMENT VIII: FLIP-FLOPS, COUNTERS 2014 Fall

Please Pass The Peas! by Terri Young/Mathis

EE 200 Problem Set 3 Cover Sheet Fall 2015

DIPLOMA IN CREATIVE WRITING IN ENGLISH Term-End Examination June, 2015 SECTION A

3/4/2016. Please Pass The Peas! by Terri Young/Mathis

DM Scheduling Architecture

Protagonist Antagonist Mission Obstacles. Basics of a Story

(Refer Slide Time 1:58)

TAYO Episode 18. Frank and Alice are Awesome! TAYO (VO) Frank and Alice are Awesome! NA Tayo and Rogi are going back to the bus garage after work.

Jamie Brown is NOT Rich by Adam Wallace

Chapter 27. Inferences for Regression. Remembering Regression. An Example: Body Fat and Waist Size. Remembering Regression (cont.)

A Prologue That Story-wise Is Out of Order

SUNDAY MORNINGS May 13, 2018, Week 2 Grade: 1-2

Children s singer-songwriter Bernhard Fibich. by a singer-songwriter from Austria/Europe

Look What I Bought You!

At this point I should say "I hope you like it" problem is, without being humble, I know you will love it. BASIC EFFECT

Alice in Wonderland. A Selection from Alice in Wonderland. Visit for thousands of books and materials.

Eminem; Marshall Bruce Mathers III

Student Conversation about Stress Management. (Characters: Sage, Heather, Jose, Brian, and Deena)

CREATIVE WRITING AT INDIANA STATE UNIVERSITY 2015 INTRODUCTION APPENDIX

MITOCW ocw f07-lec02_300k

Operating Manual for Clock / Auxiliary Displays for VHX systems

3 rd CSE Unit 1. mustn t and have to. should and must. 1 Write sentences about the signs. 1. You mustn t smoke

Important Vocabulary. What Students Need to be Able to Do: What Students Need to Know: describe (thoughts, words and interactions

MITOCW ocw f08-lec19_300k

Figure 9.1: A clock signal.

Introduction to Poetry. Rhyme Scheme and Stanzas

This is a vocabulary test. Please select the option a, b, c, or d which has the closest meaning to the word in bold.

Contents 01. Keeping up to date with artists. Intro. Feeling involved with favourite artists. Inspiration for musical choices

New feature in the ESC Data Controller Modbus Map Spreadsheet. Anthony Dougherty

WELCOME TO PROJECTION PRESENTATION TECHNOLOGY. Audio-Visual Technicians Freelance Union

Feelings, Emotions, and Affect Part 3: Energetics The Flow of Feelings & Depression Al Turtle 2000

AM I GOOD? A one act play. by Jean Blasiar. Copyright July 2015 Jean Blasiar and Off The Wall Play Publishers.

Chapter 6. Flip-Flops and Simple Flip-Flop Applications

OMNICHANNEL MARKETING AUTOMATION AUTOMATE OMNICHANNEL MARKETING STRATEGIES TO IMPROVE THE CUSTOMER JOURNEY

Idle talk or rumor, especially about the personal or private affairs of others.*

The sounds of English quiz

Professional POSING TECHNIQUES FOR WEDDING AND PORTRAIT PHOTOGRAPHERS. Amherst Media. Norman Phillips PUBLISHER OF PHOTOGRAPHY BOOKS

I start walking toward the bus stop,

AP Literature & Composition Summer Reading Assignment & Instructions

Exploring the Monty Hall Problem. of mistakes, primarily because they have fewer experiences to draw from and therefore

Content Map For Fine Arts - Music

KENT STATE UNIVERSITY ORCHESTRA SYLLABUS Fall Semester, 2016

Here s a question for you: What happens if we try to go the other way? For instance:

Don t Laugh at Me. 3 Cs F. Preparation. Vocabulary builder breaker

Chapter One The night is so cold as we run down the dark alley. I will never, never, never again take a bus to a funeral. A funeral that s out of town

CS 151 Final. Instructions: Student ID. (Last Name) (First Name) Signature

66 Porridge Script PHOTOCOPIABLE LYRICS. Musicline Publications Ltd.

POVERTY By Bobby Keniston

HOW TO GUIDE #4 HOW TO FORMAT YOUR ASSIGNMENT LAWSKOOL PTY LTD

Solutions to Embedded System Design Challenges Part II

Synchronous Sequential Logic

Introduction. The Clock Hardware. A Unique LED Clock Article by Craig A. Lindley

DIGITAL ELECTRONICS: LOGIC AND CLOCKS

LFSR stream cipher RC4. Stream cipher. Stream Cipher

100 GOOD THINGS THAT HAPPEN AS YOU GROW OLDER

World Words. Double Cross. Malorie Blackman. Teacher's Notes

Questions and Answers. There is going to be a lot of " I," but it is to emphasize that it is my own experience only.

CHAPTER 3. The Grenade

Chapter 12. Synchronous Circuits. Contents

Time Beat and Rhythm

May 13th, It started like any other day. I was sitting at my desk -- Working. That's a natural smile, because I love my job.

English (Standard) and English (Advanced) Paper 1 Area of Study Discovery!

Amanda Cater - poems -

HEAVEN PALLID TETHER 1 REPEAT RECESS DESERT 3 MEMORY CELERY ABCESS 1

Extreme Experience Research Report

and the Three Bears by Laura Peetoom illustrated by Joe Weissmann Goldie Locks and the Three Bears 1 / Scholastic Canada Ltd.

IF MONTY HALL FALLS OR CRAWLS

POETRY PORTFOLIO ELA 7 TH GRADE

A TEACHING RESOURCE FROM... AUTHOR

#031: ENCHANTED NEW YEAR NEW ENGLISH COURSE

Physics Lab 2 RLC Circuit Oscilloscope & Function Generator

LESSON 23 Jesus Rescues the Lost

Too Much Bible Story: Bottom Line: Memory Verse: Life App:

Part 4: Introduction to Sequential Logic. Basic Sequential structure. Positive-edge-triggered D flip-flop. Flip-flops classified by inputs

Digital Circuits I and II Nov. 17, 1999

Transcription:

A Tale of Transaction Put in Verse About an Illicit Kind of Commerce This is an extended version of: http://link.springer.com/chapter/10.1007%2f978-3-319-44618-9_10

A big mistake on author s side: This talk includes no outline slide!

Teaching cryptography can be so boring That one can hear students snoring To verify this claim and see Try introducing them to public key Before we delve into this lecture We need to first make a conjecture Perhaps the boredom is caused By dominance of sleep-inducing prose We thus attempt to keep the audience alert By rhymes to which we protocols convert We start with Diffie-Hellman protocol Which is by far the simplest one of all In this description, it isn t very terse Since it s presented entirely in verse NOTE: As we forward bravely plow The rhyming tempo changes now

2.1 Setup: Before our Earth was ever trod Large prime p was picked by God And if you re a godless atheist Assume that p was picked by NIST In the protocol you'll see All computations are mod p Then, a generator g was chosen And thereafter both were frozen

2.2 Interaction: Alice, one of fairer sex, Computes g to random X Bob a sketchy kind of guy Raises g to chosen Y Clock synchronization loose They exchange the residues Not to spoil all the fun But, that's the end of round one Alice, feeling a bit high Computes g X to the Y Armed with his secret, next Bob raises g Y to the X Now for both the time is ripe To bootstrap a secure pipe

3.1 Correctness To see that Diffie-Hellman works Even between two total dorks Consider that both Bob and Alice Wind up computing equal values (g X ) Y (g Y ) X 3.2 Security A passive eavesdropper can see How they obtain the shared key But even best computing toys Can t help distinguish it from noise Alas, this claim s no longer true When adversary changes hue If Eve adopts an active role We have a broken protocol

For any research paper, as all the authors know An abstract is required to keep the proper flow An abstract is a lure that must be appetizing It s typically smeared with shameless aggrandizing Which brings us to the subject of our seminal result Its impact on the Zeitgeist will alter the Gestalt This noble work is prompted by dominance of prose The reason crypto papers make readers comatose This paper makes an effort to change the status quo By showing that crypto poetry is another way to go

Whoever reads these lines shall have no fear This rhyming opus will explain Fiat-Shamir The tricky concept known as Zero Knowledge Will be as easy to digest as oatmeal porridge So, now read on and keep one thing in mind That tortured rhymes are difficult to find 2. Setup & Preliminaries Computed safely, back in ancient times Is number N a product of two primes About its origin there isn t much to say Assume (or pray) that it was not the NSA To make the protocol description very clear All computations are mod N in Fiat-Shamir

The protocol involves a dweeb, called Bob A lazy, nerdy and socially-awkward slob Like many of his bored and geeky kind Bob smokes a lot of weed to numb his mind His dealer, Alice, is crafty trailer trash Who offers pot, ecstasy, and high-grade hash Like any merchant wanting customers respect She has integrity and stature to protect For each transaction, Alice wants her client To be completely Fiat-Shamir-compliant 2.2 Assumptions To circumvent some simple online dangers Suppose that Bob and Alice aren t strangers Thus, we assume that I Bob s ID string Already hangs on Alice s public-key ring Meanwhile, its secret square root, called S Bob had tattooed on his right foot, no less NOTE: Due to consuming large quantities of pot Bob s long-term memory is unfortunately shot

The online phase begins with round one When Bob s supply of cannabis is gone Sneezing and coughing like a decrepit car Bob generates a random number we ll call R Squaring it mod N yields a value X Which he then sends to Alice all in hex Having received and stored X, she is content Since there is merchandise for her to vend Next, from her private random numbers pit Alice selects a brand new challenge bit It is referred to as C from here on She forwards it to Bob over the phone In round three, Bob readies his reply Of course, it must on challenge C rely Accordingly, it s R if C is zero, Else, R times S is sent by our hero

For C of zero, Alice squares the reply and checks Whether it matches Bob s prior commitment X She otherwise compares X times I With square mod N of Bob s previous reply Should she encounter any kind of error Alice drops everything and runs away in terror For this behavior, there is a solid reason: She simply doesn t want to land in prison Assuming all goes well, it should be clear That much remains to do in Fiat-Shamir Though it is fast, simple and discrete There is a 50-50 chance that Bob can cheat Thus, online phase must be re-run K times Because of difficulty of coming up with rhymes

Once the transaction is finally complete Both parties hurry to get off the street The dealer Alice now proactively decides That time is right to re-stock the merchandise Eager to sample freshly purchased hash Bob rushes home while clutching his new stash 5. Security Proof (Sketch) This is a mere sketch, no need to get excited A real proof, as usual, will never be provided As for security, there is but one direction It s plainly evident by cursory inspection 6. Related Work While feeling pride and yet not seeking fame Having explored the literature, we claim That this attempt at crypto-poetry is first Which might result in stirring up a hornet s nest Thus triggering a crypto-lyrical tsunami Which sadly rhymes only with pastrami

Before tapping this poem with a verbal cork We summarize directions for the future work Our research isn t finished and much is left to do For instance, proving theorems completely in haiku Devising crypto protocols for alpine cows to yodel That are proven secure in the standard crypto model How to take advantage of symmetric crypto tricks To build one-way functions that spit out limericks How to create lyrics, music and dance moves That praise the shapely beauty of elliptic curves These are just examples and challenges abound For any eager student open problems can be found

This paper demonstrated with obvious finesse The awesome teaching power of pithy crypto-verse Our research took advantage of a lucky trick By picking Fiat-Shamir as its guinea pig In sheer simplicity this method has no peer Even a total idiot can comprehend Fiat-Shamir To understand it, there s no need to go to college Its only purpose is advancing Zero Knowledge We ve reached the end and it s time for a beer Let s drink at least K rounds as in Fiat-Shamir And if we drink too much and feel a bit delirious Everyone we meet should be honest-but-curious K times 9. Disclaimer & Acknowledgments Despite severe pressure from his poetic muse The author of this poem doesn t advocate drug use This literary effort was made possible in part By generous funding from Endowment for the Art We finally acknowledge, with self-important flair Helpful comments by reviewers and the Program Chair