انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

L11 Some Results From Information Theory

الكلية كلية العلوم للبنات     القسم قسم الحاسبات     المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي       14/03/2013 19:40:03
Chapter 3
Some Results From Information
Theory
3.1 Levels of Security
De nition 3.1.1 Unconditional Security
A cryptosystem is unconditionally secure if it cannot be broken even
with in nite computational resources.
Theorem 3.1.1 The OTP is unconditionally secure if keys are only
used once.
3.2 Computational Security
For all known practical cryptosystems we have:
De nition 3.2.1 Computational Security
A system is \computational secure" if the best possible algorithm
for breaking it requires N operations, where N is very large and known.
25
Unfortunately, all known practical systems are only computational secure for known algo-
rithms.
De nition 3.2.2 Relative Security
A system is \relative secure" if its security relies on a well studied, very
hard problem.
Example:
A system S is secure as long as factoring of large integers is hard (this is believed
for RSA).
3.3 Cryptography and Coding
There are three basic forms of coding in modern communication systems: source coding,
channel coding, and encryption. From an information theoretical and practical point of
view, the three forms of coding should be applied as follows:
Data
Source
Source
Coding
Channel
Coding
Channel
Channel
Decryption Decoding
Encryption
Source
Decoding
Data
Sink
removes
redundancy
adds
redundancy
introduces
errors and
eavesdropping
Figure 3.1: Communication coding system model
26
3.4 Confusion and Di usion
According to Shannon, there are two basic approaches to encryption.
1. Confusion | encryption operation where the relationship between cleartext and ci-
phertext is obscured. Some examples are:
(a) Shift cipher | main operation is substitution.
(b) German Enigma (broken by Turing) | main operation is smart substitution.
2. Di usion | encryption by spreading out the in
uence of one cleartext letter over
many ciphertext letters. An example is:
(a) permutations | changing the positioning of the cleartext.
Remarks:
1. Today ! changing of one bit of cleartext should result on average in the change of
half the output bits.
x1 = 001010 ! encr. ! y1 = 101110.
x2 = 000010 ! encr. ! y2 = 001011.
2. Combining confusion with di usion is a common practice for obtaining a secure scheme.
Data Encryption Standard (DES) is a good example of that.
Diff-1 Conf-1 Diff-2 Conf-2 Diff-N Conf-N
product
cipher
x y’ ............... y_out
Figure 3.2: Example of combining confusion with di usion
27

المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .