16
Application Problems Introduction to Combinatorics and Cryptography Ahto Buldas [email protected] Jaan Priisalu [email protected] November 24, 2016

Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas [email protected] ... i is

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

Application ProblemsIntroduction to Combinatorics and Cryptography

Ahto Buldas [email protected]

Jaan Priisalu [email protected]

November 24, 2016

Page 2: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Topics

1 HistorySignal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

2 Implementation detailsBlock chipher modes

3 Tools for study

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 3: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Cryptanalysis known pairing

France

Poland

United Kingdom

Japan

Finland

Estonia

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 4: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 5: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Breaking Enigma

Breaking basis method is Friedman’s Index of Coincidence -statistics of letter pairwise sequencies.

Reasons of breaking Enigma:

Open commercial design

Avoiding one substitution

Plaintext partialpredictability

Operating discipline

International cooperation

Roles:

FR Obtaining machines

PL Methoddevelopment

UK Consolidation andindustrialisation

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 6: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 7: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Venona

Russians reused keys.Project 1946-1980Decryption rate

1942 1.8%

1943 15.0%

1944 49.0%

1945 1.5%

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 8: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

One-time Pad

Plaintext x is divided into blocks x = x1x2 . . . xm.Ciphertext is y also divided into blocks y = y1y2 . . . ym, whereevery ciphertext block yi is computed by

yi = xi ⊕ zi ,

where zi is the key intended for the encryption of xi .The keys zi are mutually independent and uniformly random.

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 9: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Key reuse

If all keys are the same zi = k ∀i and we know oneplaintext-ciphertext pair (xj , yj) then we can decrypt all pairs ask = xj ⊕ yj .

If we know that key is re-used one time zm = zn = k , then

ym ⊕ yn = xm ⊕ k ⊕ xn ⊕ k

= xm ⊕ xn .

XOR-ed texts can be attacked by pair frequency matrix.

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 10: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Tallinn Telegrams

Some intercepted telegrams of Russian Tallinn Embassy withMoscow are preserved.

They were misclassified in Estonian State Archive.

Content is not random, autocorrelation does exist.

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 11: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Signal Intelligence CooperationEnigmaVenonaRussian Diplomatic Communication

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 12: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for studyBlock chipher modes

Block cipher modes

Original file ECB encrypted CBC encrypted

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 13: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for studyBlock chipher modes

Mode properties

Mode Encrypt Decypt Random readECP Parallel Parallel YesCBC No Parallel YesCFB No Parallel YesOFB No No No

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 14: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for studyBlock chipher modes

PKI practical problems

Dutch DigiNotar

Swedish BankId

Estonian ID card negative moduli

Taiwan ID card weak random

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 15: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for studyBlock chipher modes

Keypair roles

SEIS original keypair roles

signature No recovery allowed

authentication Arbitrary challange

encryption Key recovery desired

FinID optimised authetication and encryption keypairs together.

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems

Page 16: Application Problems - Introduction to Combinatorics and ...ahtbu/applicationproblems.pdf · Introduction to Combinatorics and Cryptography Ahto Buldas ahto.buldas@ttu.ee ... i is

HistoryImplementation details

Tools for study

Tools to consider

cryptool.org

openssl

Cryptographers Workbench

Ahto Buldas [email protected], Jaan Priisalu [email protected] Problems