MODULE 10:   Cryptography
Cryptography

In this chapter, we introduce some of the fundamental cryptographic protocols for secure communication.

1
Private-key cryptographic system

The general setting is as follows. There are three parties named Alice, Bob and Eve. Alice’s goal is to send a private message to Bob over some channel. In particular, Alice wants only Bob to know what her message is, but unfortunately, any message she sends over the channel can be intercepted by the eavesdropper Eve. Therefore, she would like to first encrypt her message (which is also known as the plaintext) and then send the encrypted message (the ciphertext) to Bob over the channel. Bob should be able to decrypt the ciphertext and recover the plaintext. If the system is secure, then Eve learns no information about the plaintext by seeing the ciphertext. If the system is not secure, we will call it broken. We assume that Eve knows the encryption and decryption algorithms used by Alice and Bob respectively.

In a private-key cryptographic system, a protocol is designed as follows. We assume Alice has a private key KAK_A and Bob has a private key KBK_B. These keys help Alice and Bob encrypt and decrypt messages. In particular, if MM is the plaintext that Alice wants to send, she encrypts it using an encryption algorithm Enc\text{Enc} that takes MM and KAK_A as input, and produces a ciphertext CC as output: Enc(M,KA)=C\text{Enc}(M, K_A) = C. This ciphertext CC is sent to Bob, and Bob uses a decryption algorithm Dec\text{Dec} that takes a ciphertext CC and his private key KBK_B as input, and produces a plaintext MM: Dec(C,KB)=M\text{Dec}(C, K_B) = M. (We assume that M,C,KA,KBM, C, K_A, K_B are encoded as strings over some finite alphabet Σ\Sigma.)

image

A very simple example of a private-key protocol is the well-known Caesar shift. In this protocol, 0KA=KB250 \leq K_A = K_B \leq 25 and a plaintext is encrypted by replacing each letter with a letter which is KAK_A positions down the alphabet. This system is easy to break since the number of possibilities for the key is very small. Therefore one can try each possible key value one by one.

There are much more sophisticated private-key protocols. We now present a simple one that is provably perfectly secure.

1.1
One-time pad

In this section, we assume that the plaintext M{0,1}nM \in \{0,1\}^n is a binary string of length nn. Then we choose KA=KB{0,1}nK_A = K_B \in \{0,1\}^n uniformly at random (and denote it by KK). The encryption algorithm takes the bit-wise xor of MM and KK to produce an nn-bit ciphertext CC. Or in other words, for each ii, the ii’th bit of CC, C[i]C[i], is defined to be M[i]K[i]M[i] \oplus K[i]. Below is an example.

image

The decryption algorithm is exactly the same as the encryption algorithm. It takes CC and KK as input, and produces MM by taking the bit-wise xor of CC and KK. Observe that for all ii, C[i]K[i]=(M[i]K[i])K[i]=M[i](K[i]K[i])=M[i],C[i] \oplus K[i] = (M[i] \oplus K[i]) \oplus K[i] = M[i] \oplus (K[i] \oplus K[i]) = M[i], so the decryption algorithm correctly recovers the original message MM.

For any plaintext M{0,1}nM \in \{0,1\}^n, if K{0,1}nK \in \{0,1\}^n is chosen uniformly at random, then the ciphertext CC is a uniformly random element of {0,1}n\{0,1\}^n. This means that Eve learns nothing about MM by seeing CC, so the system is perfectly secure. The downside is that Alice and Bob have to share a key that is as long as the message itself.

Exercise (One-time pad based on modular multiplication)

Note that in the one-time pad cryptographic scheme described above, the underlying universe that we are dealing with is Z2n\mathbb Z_2^n with the operation being bit-wise xor. Describe a similar scheme that uses ZN\mathbb Z_N^* as the universe.

It is natural to ask whether there is any perfectly secure system like one-time pad that uses a shorter key. Claude Shannon proved that the answer is “no”. To state his result informally, he showed that if KK is shorter than MM and Eve is computationally unbounded, then Eve can learn some information about the message MM.

Given this, we let computational complexity come to our rescue. It is completely reasonable to assume that Eve is indeed computationally bounded. So from now on, we will assume that Eve is a polynomial-time agent.

1.2
Diffie-Hellman secret key exchange

We present a protocol for Alice and Bob to agree on a secret key KK by communicating publicly. The protocol is secure if Eve has no information about KK even though she sees all the communication between Alice and Bob. This sounds like an impossible task, but it is actually believed to be feasible.

The protocol makes use of the assumption that the Discrete Log problem is computationally hard and it goes as follows. Alice picks privately a (sufficiently large) random prime number PP, a generator BB in ZP\mathbb Z_P^*, and a random exponent E1Zφ(P)E_1 \in \mathbb Z_{\varphi(P)}. She computes BE1B^{E_1} in ZP\mathbb Z_P^* and sends over to Bob P,B,BE1P, B, B^{E_1}. Bob privately picks a random exponent E2Zφ(P)E_2 \in \mathbb Z_{\varphi(P)} and computes BE2B^{E_2} in ZP\mathbb Z_P^*. He sends BE2B^{E_2} to Alice. At this point both players can privately compute S=BE1E2S = B^{E_1E_2} in ZP\mathbb Z_P^*, which is defined as the secret key that they now share. The protocol is illustrated below.

image

There are two important questions related to this protocol. First, are all the operations done by Alice and Bob polynomial-time computable? Second, how secure is the system?

Even though we won’t explicitly discuss it, every computation done by Alice and Bob can indeed be done in polynomial time. For the security, observe that we definitely need the Discrete Log problem to be computationally hard, because otherwise, Eve can compute E1E_1 from BE1B^{E_1} and E2E_2 from BE2B^{E_2}. Then it is easy for her to compute the “secret” BE1E2B^{E_1E_2} (since she also knows BB). To be more careful though, we want that given P,B,BE1,BE2P, B, B^{E_1}, B^{E_2} (i.e. what Eve sees), it is computationally hard to compute BE1E2B^{E_1E_2}. This is known as the Diffie-Hellman assumption. Unfortunately we cannot prove this assumption since if we could, we would be also proving PNP\mathsf{P} \neq \mathsf{NP}. Even if the Diffie-Hellman assumption holds, we should not be satisfied. Not only we don’t want Eve to compute the secret BE1E2B^{E_1E_2}, but we don’t want her to gain any information about BE1E2B^{E_1E_2} (e.g. not even the first bit of it). The assumption that Eve learns nothing about the secret is known as the Decisional Diffie-Hellman assumption.

2
Public-key cryptographic system

In a public-key cryptographic system, our goal is to design a protocol that allows Alice to send a message to Bob without the need of having to exchange messages in order to share a secret key.

In order to establish this, a public-key cryptographic system uses the following general strategy. Bob generates a tuple of keys (Kpri,Kpub)(K_{\text{pri}}, K_{\text{pub}}), where KpriK_{\text{pri}} is called the private key and is kept private to him, and KpubK_{\text{pub}} is called the public key and is published to the world. If someone (e.g. Alice) wants to send a message to Bob, they use the public key to encrypt their message MM. That is, the ciphertext CC is produced by running an encryption algorithm Enc(M,Kpub)\text{Enc}(M, K_{\text{pub}}). Once Bob receives CC, he decrypts it using his private key by running a decryption algorithm Dec(C,Kpri)\text{Dec}(C, K_{\text{pri}}).

image

We now present different instantiations of this idea.

2.1
ElGamal public-key cryptographic system

The first public-key protocol we present is similar in nature to the Diffie-Hellman secret-key exchange protocol. In fact, it is basically combining the Diffie-Hellman secret-key exchange protocol with the one-time pad protocol. It is easy to combine them to create a private-key cryptographic system. Here, we’ll see that they can also be combined to create a public-key cryptographic system.

To make the correspondence clear with the Diffie-Hellman secret-key exchange protocol, we reverse the roles of Alice and Bob. Below are the details.

In the ElGamal protcol, Bob picks a (sufficiently large) prime number PP, a generator BZPB \in \mathbb Z_P^*, and a random exponent E1Zφ(P)E_1 \in \mathbb Z_{\varphi(P)}. He computes BE1B^{E_1} in ZP\mathbb Z_P^*. The private key is Kpri=E1K_{\text{pri}} = E_1 and the public key is Kpub=(P,B,BE1)K_{\text{pub}} = (P, B, B^{E_1}).

The message MM that Alice wants to send is viewed as an element of ZP\mathbb Z_P^* (it is easy to agree on an encoding scheme to do this). To encrypt her message, Alice does the following. She picks a random exponent E2Zφ(P)E_2 \in \mathbb Z_{\varphi(P)}, and computes BE2B^{E_2}, BE1E2B^{E_1E_2} and MBE1E2MB^{E_1E_2} in ZP\mathbb Z_P^*. Then the ciphertext she sends over to Bob is C=(C1,C2)=(BE2,MBE1E2)C = (C_1, C_2) = (B^{E_2}, MB^{E_1E_2}). Once Bob receives this message, using C1C_1 he first computes C1E1=BE1E2C_1^{E_1} = B^{E_1E_2} in ZP\mathbb Z_P^*. Note that this is the secret key from the Diffie-Hellman protocol. Let’s call it SS. He computes S1S^{-1} in ZP\mathbb Z_P^*. Then he computes C2S1=MC_2S^{-1} = M to recover the original message MM.

Even though this may seem like a non-simple protocol, it has a simple summary once you understand the Diffie-Hellman secret-key exchange protocol. Effectively, Alice and Bob are sharing the private secret S=BE1E2S = B^{E_1E_2} as in the Diffie-Hellman secret-key exchange protocol. Alice “masks” her message MM using SS (note that this is equivalent to doing a one-time pad in the universe ZP\mathbb Z_P^*). Since Bob also knows SS, he can compute its inverse, and therefore recover MM.

image

As in the Diffie-Hellman secret-key exchange protocol, all the computation done by Alice and Bob can be carried out in polynomial time. Furthermore, the security is based on the same assumptions as in the Diffie-Hellman secret-key exchange protocol. The details are omitted.

2.2
RSA public-key cryptographic system

The RSA cryptographic system uses the assumption that taking roots in the modular universe is a computationally hard problem. Notice that taking roots is the inverse of the exponentiation function. And in RSA, the encryption is indeed done using the exponentiation function. Below are the details.

First, Bob picks two (sufficiently large) distinct prime numbers PP and QQ. He multiplies them together to obtain N=PQN = PQ. He picks an exponent EZφ(N)E \in \mathbb Z_{\varphi(N)}^*. He computes E1E^{-1} in Zφ(N)\mathbb Z_{\varphi(N)}^* and keeps that as his private key, Kpri=E1K_{\text{pri}} = E^{-1}. The public key is Kpub=(N,E)K_{\text{pub}} = (N, E).

The message MM that Alice wants to send to Bob is viewed as an element of ZN\mathbb Z_N^*. To encrypt her message, she computes C=MEC = M^E in ZN\mathbb Z_N^*, and sends it over to Bob. The decryption algorithm happens to be exactly the same as the encryption algorithm. Once Bob receives CC, he computes CE1C^{E^{-1}} in ZN\mathbb Z_N^*, and recovers MM since CE1=(ME)E1=MEE1=MC^{E^{-1}} = (M^{E})^{E^{-1}} = M^{EE^{-1}} = M.

image

As before, it can be shown that all the computation done by Alice and Bob is polynomial-time. We now make a few comments about the security of the system. What is the advantage that Bob has over Eve that allows him to decrypt the message? If Eve could compute E1E^{-1} herself, then she would be able to decrypt the message as well. To compute E1E^{-1}, you need to know φ(N)\varphi(N) since E1E^{-1} lives in Zφ(N)\mathbb Z_{\varphi(N)}^*. Bob’s advantage is that he can easily compute φ(N)\varphi(N) because φ(N)=(P1)(Q1)\varphi(N) = (P-1)(Q-1). In other words, the advantage that Bob has is that he knows the prime factorization of NN. If Eve could factor NN efficiently, then she could also easily compute φ(N)=(P1)(Q1)\varphi(N)= (P-1)(Q-1). It turns out that factoring NN and computing φ(N)\varphi(N) are computationally equivalent in the following sense. Clearly, as we argued, if we can factor NN in polynomial time, then we can compute φ(N)\varphi(N) in polynomial time. Furthermore, if we can compute φ(N)\varphi(N) in polynomial time, then we can factor NN in polynomial time (we leave this as an exercise to the reader).

One might ask if computing φ(N)\varphi(N) is the only way to crack RSA. We don’t know the answer to this question. So we cannot rule out that there might be some other devious way of recovering the message MM without computing φ(N)\varphi(N) (or factoring NN).

3
Check Your Understanding
Problem
  1. Consider the one-time pad cryptographic system. Show that for any plaintext M{0,1}nM \in \{0,1\}^n, if the key K{0,1}nK \in \{0,1\}^n is chosen uniformly at random, then the ciphertext CC is a uniformly random element of {0,1}n\{0,1\}^n.

  2. Describe the Diffie-Hellman secret key exchange protocol.

  3. Quantum computers can compute the discrete log problem efficiently. Explain how quantum computers can be used to break the Diffie-Hellman secret key exchange protocol.

  4. Describe the RSA public-key protocol.

  5. Quantum computers can compute the discrete root problem efficiently. Explain how quantum computers can be used to break the RSA public-key protocol.

  6. Quantum computers can compute the factoring problem (given an integer NN, output its prime factors) efficiently. Explain how quantum computers can be used to break the RSA public-key protocol.

4
High-Order Bits
Important Note
  1. Understand the general outline of how private-key protocols and public-key protocols work, independent of specific implementations of these ideas.

  2. Make sure you understand how the one-time pad private-key protocol works and why it is a perfectly secure protocol.

  3. You should be able to describe the Diffie-Hellman secret key exchange protocol and how it relates to the assumed hardness of the discrete log problem.

  4. You should be able to describe the RSA public-key protocol and how it relates to the assumed hardness of the discrete root problem. You should also understand the relevance of the factoring problem in this setting.

See https://en.wikipedia.org/wiki/Caesar_cipher for details on the Caesar shift.
For the system to remain perfectly secure, you should not reuse the same key for more than one message. This is the reason for the name “one-time pad”.
Why is the exponent chosen from \(\mathbb Z_{\varphi(P)}\)? Recall that thanks to Euler’s Theorem, if we are exponentiating an element \(A \in \mathbb Z_N^*\), then we can effectively think of the exponent as living in the set \(\mathbb Z_{\varphi(N)}\).
Decisional Diffie-Hellman assumption turns out to be false in the group \(\mathbb Z_P^*,\) but there are other cyclic groups for which experts believe the assumption should hold.
Why is \(N\) chosen to be a product of primes and not just a prime number? We will explore this question after we describe the protocol.
Why is the exponent chosen from \(\mathbb Z_{\varphi(N)}^*\)? Once again, if we are exponentiating an element \(A \in \mathbb Z_N^*\), then we can effectively think of the exponent as living in the set \(\mathbb Z_{\varphi(N)}\). In the RSA protocol, we will need the exponent to have an inverse in \(\mathbb Z_{\varphi(N)}\) and therefore we pick it from \(\mathbb Z_{\varphi(N)}^*\).