Definition: A Cryptosystem has
five elements
where:
are finite sets:
the plain text , the members of are called symbols.
We will most often use the notation
reserving
for probabilities.
the cipher text. We will most often use the notation
the set of keys . It is sometimes necessary to distinguish
between keys used for encryption and decrypting but when we want to refer to
keys in general we will use the
notation
A message is a string of plain text
symbols.
is
called the Encryption
Function.
is
called the Decryption
Function.
For each
,
there exists a key
such that for any
Definition: A cryptosystem is called
symmetric or private key if
can be computed from
by
a simple computation, for example
.
A private key cryptosystem would be used to exchange messages under the assumption that those exchanging messages could encode and decode all communications using the private key
and hence
.
Definition: A cryptosystem is called
asymmetric or public key if
,
and computing
from
is computationally intractable, or at least very difficult.
A public
key cryptosystem would be used for one way communication.
would be made public and would be used to encode messages and then communicate
them to the holder of
A typical use of a public key cryptosystem might be a Bank receiving information over the internet.
{A,B,C....,Z}
{A,B,C....,Z}
{1,2,3....,25}
shift
right
letters ,
encodes
symbol by
symbol
shift
left
symbols.
{A,B,C....,Z}
considered as members of
(A is 0
and Z
is 25).
{A,B,C....,Z} considered
as members of
.
The
set of
invertible
matrices in
is defined as
follows:
Given
a message
and
,
by padding if necessary, write
a concatenation of strings of length
.
Let
and
send
, again a concatenation of strings of length
"Deconcatenate"
back into strings of length
then
Setting:
We are given a Cryptosystem
and
probability distributions
and
Moreover, we assume that the distributions of
and
are
independent,
.
Hence we can compute
Assumptions:
,
,
the key set and cipher sets are the same size.
The distribution
is
uniform, for all
,
The equation
has
a unique solution for all
,
, given
and
there
is a unique
such that
.
Consequences:
,
because of Assumption
3.
,where
.
A Cryptosystem
has perfect secrecy if for any
and
The probability that
was the source symbol given that it was encoded as
is the same as the probability that
was the source symbol. Someone intercepting the code can't use it to infer the
original text.
The Vernam
One-Time Pad:
,
where stands for vector (bit-wise) addition.
Since
,
For any
and
there is a unique
such that
In fact
Using the One-Time Pad:
As an example, let
.
Create 2 copies of a pad, or tape, or flash drive containing a very long list
randomly generated bytes, one for each site that will be exchanging private
messages.
Suppose site A wants to send a message to site
B. Starting at the beginning of the list encode the message
byte by byte using the key bytes in sequence. When the message has been
encoded, A marks the last key byte that has been used. .
Site B receives the encoded message and, again starting with
the first key byte, decodes the message byte by byte. Also again, noting the
last byte used, which will be the same byte noted by A.
If B wants to respond to A, it begins to encode using the pad and beginning with the first unused byte.
{A
,B,....Z}
{0,1,....25}
For any
and
there is a unique
such that