Introduction To Entropy
Introduction To Entropy
Douglas R. Stinson
CS 858
Spring 2019
Outline
attack model
The attack model specifies the information available to the
adversary. In the case of encryption schemes, this information
could include ciphertexts, plaintext-ciphertext pairs, temporary
access to encryption or decryption oracles, etc. We will always
assume that the adversary knows the protocol being used (this is
called Kerckhoff’s Principle).
A Formal Model (cont.)
computational resources
Here, we specify the computational resources available to the
adversary, such as computing equipment, algorithms, computing
time, etc. In the case of unconditional security (aka
information theoretic security), the adversary is assumed to
have unlimited computational resources.
adversarial goal
The adversarial goal specifies what it means to “break” the
protocol. What is the adversary attempting to do and/or what
problem is he trying to solve? How is the notion of a “successful
attack” defined?
A Formal Model (cont.)
Definition
A cryptosystem is a five-tuple (P, C, K, E, D), where the
following conditions are satisfied:
1. P is a finite set of possible plaintexts.
2. C is a finite set of possible ciphertexts.
3. K, the keyspace, is a finite set of possible keys.
4. For each K ∈ K, there is an encryption rule eK ∈ E and a
corresponding decryption rule dK ∈ D. Each eK : P → C
and dK : C → P are functions such that dK (eK (x)) = x for
every plaintext element x ∈ P.
Communication Channel
y
Alice −−−−−−−−−−−−−−−−−−−−−−−−→ Bob
↓
Eve sees y
Perfect Secrecy
Pr[x = x] × Pr[y = y |x = x]
Pr[x = x|y = y ] = .
Pr[y = y ]
a b
K1 1 2
K2 2 3
K3 3 4
An Example (cont.)
Pr[a|1] = 1 Pr[b|1] = 0
1 6
Pr[a|2] = Pr[b|2] =
7 7
1 3
Pr[a|3] = Pr[b|3] =
4 4
Pr[a|4] = 0 Pr[b|4] = 1.
Recalling that Pr[a] = 1/4 and Pr[b] = 3/4, we see that the
perfect secrecy property is satisfied for the ciphertext y = 3, but
not for the other three ciphertexts.
One-time Pad
The one-time pad is the best known example of a cryptosystem
that provides perfect secrecy.
Protocol: One-time Pad
Let n ≥ 1 be an integer, and take P = C = K = (Z2 )n . For every
K ∈ (Z2 )n , let Pr[K] = 2−n (i.e., keys are chosen equiprobably)
and for every x ∈ (Z2 )n , define eK (x) to be the vector sum
modulo 2 of K and x (or, equivalently, the exclusive-or of the two
associated bitstrings). So, if x = (x1 , . . . , xn ) and
K = (K1 , . . . , Kn ), then
dK (y ) = y ⊕ K = (y1 + K1 , . . . , yn + Kn ) mod 2.
An Example
Pr[K] = 2−n .
• For every x, y ∈ (Z2 )n ,
1 2 3 4 5
2 3 4 5 1
3 4 5 1 2
4 5 1 2 3
5 1 2 3 4
Weakening the Perfect Secrecy Requirement
Some results have been proven about encryption schemes with
“short” keys that weaken the perfect secrecy requirement, e.g., in
Y. Dodis and A. Smith, “Entropic security and the encryption
of high entropy messages”, LNCS 3378 (2005), 556–577.
Theorem
Suppose P = {0, 1}n has a probability distribution such that
Pr[x] ≤ 2−t for all x ∈ P. Let k = n − t + 2 log2 (1/) + 2 for
some positive real number , where k ≤ n. Define K = {0, 1}k .
For x ∈ P and K ∈ K, define y = eK (x) = (r, x ⊕ r K), where
r ∈ {0, 1}n is chosen randomly and r K is computed in F2n . Let f
be any function with domain P. Then, given y , no adversary can
predict f (x) with advantage exceeding .
“Advantage” refers to the increase in the probability that the
adversary can compute f (x) after he is given y .
Authentication Codes
Definition
An authentication code is a four-tuple (S, A, K, H), where the
following conditions are satisfied:
1. S is a finite set of possible source states.
2. A is a finite set of possible authentication tags.
3. K, the keyspace, is a finite set of possible keys.
4. H is a finite set of possible authentication rules. For each
K ∈ K, there is an authentication rule hK ∈ H such that
hK : S → A.
The message set is defined to be M = S × A.
A message m = (s, a) is valid under key K if hK (s) = a.
Simmons’ Model for Authentication
(s, a)
Oscar −−−−−−−−−−−−−−−−−−−−−−−−→ Bob
(s, a) (s 0 , a0 )
Alice −−−−−−→ Oscar −−−−−−→ Bob
Deception Probabilities
0 1 2
K1 0 0 0
K2 1 1 1
K3 2 2 2
K4 0 1 2
K5 1 2 0
K6 2 0 1
K7 0 2 1
K8 1 0 2
K9 2 1 0
|H|
|{h ∈ H : h(x1 ) = y1 }| = .
|Y|
|H|
|{h ∈ H : h(x1 ) = y1 , h(x2 ) = y2 }| ≤ .
|Y|
Pr[h(x2 ) = y2 |h(x1 ) = y1 ] ≤ .
Theorem
If there exists an (N; n, m)--ASU family |H| of hash functions
from X to Y, then there exists an authentication code for n
source states, having m authentication tags and N authentication
rules (and keys), such that Pd0 = 1/m and Pd1 ≤ .
• The previous result says that the key is very long if we use a
strongly universal hash family for authentication.
• In fact, an identical bound holds for any authentication code
that attains the optimal (i.e., minimum) values of Pd0 and
Pd1 .
• Wegman and Carter gave a construction that showed that
the key length could be reduced dramatically if Pd1 is a bit
bigger than the optimal value.
• Here we describe a general framework to construct efficient
Wegman-Carter type authentication codes based on certain
types of universal hash families.
Universal Hashing
Theorem
Suppose H1 is an 1 -AU class of hash functions from X1 to Y1 ,
and suppose H2 is an 2 -ASU class of hash functions from Y1 to
Y2 . Then there exists an -ASU class H of hash functions from
X1 to Y2 , where = 1 + 2 and |H| = |H1 | × |H2 |.
Construction. For every h1 ∈ H1 and every h2 ∈ H2 define a
hash function h1 ◦ h2 as follows:
for all x ∈ X1 .
Composition Construction (cont.)
Proof. Property 1. is easy to verify. We prove property 2. when
y1 = y2 (this is the case that yields the highest probability).
Let x1 , x2 ∈ X1 . We distinguish two cases:
case 1 h1 (x1 ) = h1 (x2 ) occurs with probability at most 1 .
Then
1
Pr[h(x1 ) = h(x2 ) = y1 |h1 (x1 ) = h1 (x2 )] = .
|Y2 |
log2 |K| ≈ 3 log2 |A| + 2(log2 log2 |S| − log2 log2 |A|).
Wyner’s Wiretap Channel
• The wire-tap channel was introduced in A.D. Wyner, “The
wire-tap channel”, The Bell System Technical Journal 54
(1975), 1355–1387.
• Alice uses a non-secret encoding method to encode a one
bit message b as x = x1 . . . xn to send to Bob.
• Suppose there is a reliable channel connecting Alice and Bob,
but Eve (the eavesdropper) sees a corrupted version z of x.
• For example, suppose that Eve’s wiretap channel is a binary
symmetric channel with error probability p < 1/2.
• That is, Pr[zi = xi ] = 1 − p and Pr[zi 6= xi ] = p.
x ...x
Alice −−−−−−−−−−−1−−−−n−−−−−−−−−→ Bob
↓
Eve sees z1 . . . zn
Wyner’s Wiretap Channel (cont.)
x, f
Alice −−−−−−−−−−−−−−−−−−−−−−−−→ Bob
↓
Eve sees z = e(x) and f
t
X Y x − xik
a(x) = sij .
xij − xik
j=1 1≤k≤t,k6=j
• set x = 0; then
t t
X Y −xik X Y xik
K= sij = sij .
xij − xik xik − xij
j=1 1≤k≤t,k6=j j=1 1≤k≤t,k6=j
Reconstruction (cont.)
• With a bit more work, we can show that the Shamir scheme
satisfies a property analogous to perfect secrecy.
• We assume an arbitrary but fixed a priori probability
distribution on K.
• Given any set of τ ≤ t − 1 or fewer shares, say sij ,
j = 1, . . . , τ , and given any K0 ∈ K, it is possible to show
that
Pr[K0 |si1 , . . . , siτ ] = Pr[K0 ].
Key Predistribution
• Suppose p = 17.
• Suppose there are three users: U, V and W , and their public
values are rU = 12, rV = 7 and rW = 1.
• Suppose the TA chooses the polynomial
gU (x) = 7 + 14x
gV (x) = 6 + 4x
gW (x) = 15 + 9x
A Toy Example (cont.)
KU,V = 3
KU,W = 4
KV ,W = 10
gU (rV ) = 7 + 14 × 7 mod 17 = 3
gV (rU ) = 6 + 4 × 12 mod 17 = 3
Security of the Blom Scheme
m+1
X Y y − yh
A(x, y ) = aj (x) .
yj − yh
j=1 1≤h≤m+1,h6=j
Example of Bivariate Interpolation
Suppose that p = 13, m = 2, y1 = 1, y2 = 2, y3 = 3
a1 (x) = 1 + x + x 2 , a2 (x) = 7 + 4x 2 and a3 (x) = 2 + 9x. Then:
(y − 2)(y − 3)
= 7y 2 + 4y + 3
(1 − 2)(1 − 3)
(y − 1)(y − 3)
= 12y 2 + 4y + 10
(2 − 1)(2 − 3)
(y − 1)(y − 2)
= 7y 2 + 5y + 1
(3 − 1)(3 − 2)
Y (x − rW i )(y − rW i )
f0 (x, y ) = f (x, y ) + (K0 − K) .
(rU − rW i )(rV − rW i )
1≤i≤k
Security wrt k Colluders (cont.)
• Further,
f0 (rU , rV ) = f (rU , rV ) + K0 − K = K0 .
• We have shown that, for any possible value of the key, say
K0 , there is a symmetric polynomial f0 such that the key
KU,V = K0 and such that the secret information held by the
k bad users is unchanged.
Closing Remarks
• There is a rich body of work on unconditionally secure
cryptography.
• Unconditionally secure schemes tend to have simple
constructions and they are very efficient.
• Ultimately, any security proof in the unconditionally secure
setting is a proof about certain probability distributions.
• Some goals cannot be accommodated in the unconditionally
secure setting (e.g., public-key encryption schemes).
• Some goals can be achieved only by assuming some
limitations on the usage or functionality of the scheme
and/or the number of adversaries who are conspiring to
break the scheme.
• Nevertheless, unconditionally secure schemes are very useful
in a wide variety of contexts, including conventional
(computationally secure) cryptography.