Asymmetric Cryptography
part 1 & 2
Haya Shulman
Many thanks to Amir Herzberg who donated some of the slides from
http://www.cs.biu.ac.il/~herzbea/89-690/index.html
Talk Outline
Heuristic vs Provable Security Approaches
Kerkhoff Principle
Public-key Encryption Scheme Definition
Security Definition
Adversarial Power and the Break
Symmetric&Asymmetric Security Specifications (CPA, CCA, CCA2)
Information Theoretically Secure Public Key Encryption
Scheme?
Deterministic Public Key Schemes?
Hybrid encryption
Heuristic vs Provable Security Approaches
The heuristic approach
The provable security
Build-break-fix paradigm
Failed cryptanalysis
Reductions to hardness assumptions
Reduction is a basic cryptographic technique
The information theoretic security
Kerckhoff ’s Principle: Known Design
Security through obscurity is a common approach in the
industry
Attacks (e.g. cryptanalysis) of unknown design can be much harder
But using public (non-secret) designs…
Published designs are often stronger
No need to replace the system once the design is exposed
No need to worry that design was exposed
Establish standards for multiple applications:
Efficiency of production and of test attacks / cryptanalysis
Kerckhoff ’s Known Design Principle [1883]: adversary
knows the design – everything except the secret keys
Talk Outline 好晚
Heuristic vs Provable Security Approaches
Kerkhoff Principle
Public-key Encryption Scheme Definition
Security Definition
Adversarial Power and the Break
Symmetric&Asymmetric Security Specifications (CPA, CCA, CCA2)
Information Theoretically Secure Public Key Encryption
Scheme?
Deterministic Public Key Schemes?
Hybrid encryption
Public-key Encryption Scheme
plaintext
Key Alice uses
B.e to encrypt to
Bob
B.d
encryption
algorithm
decryption plaintext
algorithm
Alice
(the sender)
ciphertext
Key Bob uses
to decrypt
Bob
(the receiver)
B.e is a public encryption key, B.d is a matching private
decryption key
Only the key protects confidentiality
Encryption Scheme Definition
No distinction between public/ secret key encryption
schemes
No security requirement
Includes trivial (insecure) encryption schemes
Talk Outline
Heuristic vs Provable Security Approaches
Kerkhoff Principle
Public-key Encryption Scheme Definition
Security Definition
Adversarial Power and the Break
Symmetric&Asymmetric Security Specifications (CPA, CCA, CCA2)
Information Theoretically Secure Public Key Encryption
Scheme?
Deterministic Public Key Schemes?
Hybrid encryption
Defining Adversarial Power
Computational power
Computational bounds on its running time
Uniform/ non-uniform
What actions can it take?
Passive, eavesdropping
Active, can obtain encryptions/ decryptions
Defining the Break
Define the successful break of the scheme
Recovering the secret key
Decrypting the challenge
Learning some partial information about the encrypted
message!
Simulating reality using experiments
Indistinguishability (CPA, CCA, adaptive-CCA)
Indistinguishability Experiment
(asymmetric encryption, a.k.a Public Key)
plaintext
Alice
Encrypt, or
B.e select b {0,1}
and encrypt mb
B.d
encryption
algorithm
decryption plaintext
algorithm
ciphertext
Ciphertext
c=EB.e(m)
Chosen plaintext m
Selected messages m0, m1
Key Bob uses
to decrypt
Chosen
ciphertext c
Eve
Guess of b
Decryptions
m=DB.d(c)
Bob
IND-CPA Security Specification
IND-CCA Security Specification
IND-CCA2 Security Specification
Indistinguishability Experiment
(symmetric encryption, i.e. shared key)
k
plaintext
Alice
Encrypt, or
select b {0,1}
and encrypt mb
encryption
algorithm
k
decryption plaintext
algorithm
ciphertext
Ciphertext
c=Ek(m,re)
Chosen plaintext m
Selected messages m0, m1
Chosen
ciphertext c
Eve
Guess of b
Decryptions
m=Dk(c)
Bob
Eavesdropping (Passive) Attacks Security
Specification
Weakest type of adversary
Adversary only obtains the ciphertext that it wishes
to decrypt
Eavesdropps on the communication line between two
parties and intercepts the encrypted communication
Does not obtain oracle access to encryption or
decryption functionality
Does not obtain the encryption key
Eavesdropping Attacks Security
Specification
Chosen Plaintext Attacks Security
Specification
Talk Outline
Heuristic vs Provable Security Approaches
Kerkhoff Principle
Public-key Encryption Scheme Definition
Security Definition
Adversarial Power and the Break
Symmetric&Asymmetric Security Specifications (CPA, CCA, CCA2)
Information Theoretically Secure Public Key Encryption
Scheme?
Deterministic Public Key Schemes?
Hybrid encryption
Perfectly Secure Public-Key Encryption
Scheme
A public key encryption scheme is perfectly secure if
for every public encryption key e, all messages m0, m1,
|m0|=|m1|, all ciphertexts c and all algorithms A
holds
What does it mean for an encryption scheme to be
perfectly secure?
The adversary gains no advantage
Above pure guess
Perfectly Secure Public-Key Encryption
Schemes Do NOT Exist
Proof
Let = (G,E,D) be a public key encryption scheme
operates over messages of one bit and encryption/
decryption always succeeds
Construct an algorithm A s.t.
Perfectly Secure Public-Key Encryption
Schemes Do NOT Exist
If c is an encryption of 0 then there exists a
random i0, otherwise there exists i1
A will always return a correct answer since
while
Talk Outline
Heuristic vs Provable Security Approaches
Kerkhoff Principle
Public-key Encryption Scheme Definition
Security Definition
Adversarial Power and the Break
Symmetric&Asymmetric Specifications (CPA, CCA, CCA2)
Information Theoretically Secure Public Key Encryption
Scheme?
Deterministic Public Key Schemes?
Hybrid encryption
Deterministic Public Key Encryption
Schemes Do NOT Exist
Proof
Let =(G,E,D) be a deterministic public key encryption
scheme
operates over messages of one bit length and the
decryption always succeeds
Construct A s.t.
Talk Outline
Heuristic vs Provable Security Approaches
Kerkhoff Principle
Public-key Encryption Scheme Definition
Security Definition
Adversarial Power and the Break
Symmetric&Asymmetric Security Specifications (CPA, CCA, CCA2)
Information Theoretically Secure Public Key Encryption
Scheme?
Deterministic Public Key Schemes?
Hybrid encryption
Symmetric vs. Asymmetric
Is there a perfectly secure private key encryption
scheme?
Is there a secure deterministic private key
encryption scheme?
Depends on the attack model
Why not define the strongest security for any
scheme?
There is a price for being overly conservative
Arbitrary Length Public-key Encryption
Scheme
Secure public-key encryption scheme for one bit
implies security under multiple encryptions, given
m=m1…mL encrypt
Inefficient
L times the computational cost of encrypting one block
Ciphertext length increases
Public key cryptosystems are slow
Also: most (e.g. RSA) have fixed block size (FIL)
Using a long block size is veeery slooow
Hybrid Encryption (`enveloping`)
Can we do better?
Use VIL secret key cryptosystem, encrypt shared key and
use it to encrypt plaintext
e
Decryption
Encryption
K
Plaintext
m
{0,1}k
CKEY
CMSGESKK(m)
EPK
e(K)
CKEY
K DPKd(CKEY)
CMSG
DSKK(CMSG)
Hybrid Encryption - Construction
Secure public key encryption scheme
Secure private key encryption scheme
construct a hybrid encryption scheme
Hybrid Encryption - Security
Theorem: If
is an IND-CPA secure public key
encryption scheme and
is an IND-CPA secure
private key encryption scheme then
is an INDCPA secure public key encryption scheme for
arbitrary length messages
Proof: We need to show that
For any PPT A and any m0, m1 we need to bound
Hybrid Encryption Proof, cont’
By definition of hybrid encryption algorithm it is
equivalent to
Now given A against the hybrid scheme construct
an algorithm ASK against the private key encryption
scheme
Hybrid Encryption Proof, cont’
Analysis of ASK‘s success probability
But, is this equivalent to
Why?
Because
There is no way for to choose the key K’ s.t. it is
equal to K used to encrypt the challenge
Hybrid Encryption Proof,
nd
2
Attempt
Given A=(A1,A2) against we construct
and
and
against
against
The advantage of A is bounded by the sum of the
advantages of each of the algorithms above
Hybrid Encryption Proof, cont’
We first show that
Given a PPT algorithm A=(A1,A2) construct a PPT
against
Hybrid Encryption Proof, cont’
The success probability of
Since
is IND-CPA secure the advantage is
negligible
Hybrid Encryption Proof, cont’
We next show that
Given a PPT algorithm A=(A1,A2) construct a PPT
against
Hybrid Encryption Proof, cont’
The success probability of
Since
is IND-CPA secure the advantage is
negligible
Hybrid Encryption Proof, cont’
In the third step show that
Given a PPT algorithm A=(A1,A2) construct a PPT
against
Hybrid Encryption Proof, cont’
The success probability of
Since
is IND-CPA secure the advantage is
negligible
We obtain
and conclude that
Hybrid Encryption Proof, fin’
Asymmetric Encryption
End of part 1 and 2
Questions?
Thank you.
© Copyright 2026 Paperzz