Mathematical Foundations
Welcome!
Welcome to this short web book on modern cryptographic techniques! My goal in writing this book is primarily to provide an accessible, understandable, centralized place to explain as much about cryptography as I can. I've split this book up into relatively isolated chapters - that being said, reading in order is recommended.
Throughout the chapters, we will go over the classical, everyday cryptography that many of us are used to, and then cover more advanced, modern topics with more specialized applications. Indeed, we are currently experiencing a renaissance of sorts in the cryptographic community with blockchain technology and consumer privacy fuelling much of the excitement. While these facets are indeed interesting and we will draw from them to motivate some of our applications, they are not the focus of this book. We will stick to the cryptography itself.
Specifically, we will first cover private key and public key primitives, and some of the everyday applications of both. Next, we will explore zero knowledge proofs, a technique for proving that a particular statement is true without revealing any other unnecessary information. Following that, we will dive into multiparty computation, a set of protocols in which multiple parties can jointly compute a result over some inputs without revealing the inputs to each other. Lastly (for now), we will explore homomorphic encryption, a set of techniques that allow computation over encrypted data. However before anything else, we must go over some preliminary mathematics, which this article will cover.
Elementary Number Theory
The following is an overview of the algebra and number theory necessary to understand the cryptographic schemes in this book. You can safely skip this section if you're already familiar with elementary number theory. We try to use notation that is common in the literature.
Divisibility and GCDs
Consider two integers
Given integers
Recall greatest common divisors (GCDs). Given two integers
Groups
To allow us to generalize later on, we introduce the notion of a group. A group is defined as a set
- Identity: there exists an identity element
such that for any element we have that . - Associativity: for any
, we have that . - Inverses: for any
, there exists an inverse element such that . We denote the inverse of by .
For example,
The set of integers modulo a prime
Let's verify that
Lastly, a cyclic group is a group
Fast Powering
We take an aside and consider group elements of the form
Fermat's Little Theorem and Euler's Theorem
We end this section with two more useful results, which we state without proof. Fermat's Little Theorem (FLT) states that given a prime
Euler's Theorem, which generalizes FLT, states that given any integer
Proofs of Security
We now turn our attention to a very different flavour of mathematics in the form of proofs of security. Philosophically, treating security properties mathematically is a rather unintuitive endeavour. Indeed, such proofs of security are a comparatively recent phenomenon. However, it gives us a rigorous way to show that a particular protocol fulfills certain security properties.
What does it mean for a protocol to be secure? Let's say we've devised a communication protocol that uses a particular encryption algorithm. How do we prove that the protocol is secure? That the algorithm is secure?
This is a particularly troubling question for a number of reasons. Firstly, we haven't clearly defined what it means to be secure. To solve this, we define the notion of a security property. In essense, a security property describes in what cases a protocol is unbreakable. The majority of security properties are described in terms of security games.
Security Games
Instead of explaining what a security game is and explaining how it maps to traditional, straightforward definitions of security, we will give an example that doesn't use any cryptographic language:
Let
be algorithms that hide and show a particular message. We have that , and we also have that any polynomial-time adversary in the following game has negligible advantage:
- The adversary generates two equal-length messages
and sends them both to the challenger. - The challenger will choose a message
uniformly at random, and send back . - The adversary guesses
, and wins if they guess correctly.
There's a lot to unpack here. A security definition generally starts with a set of definitions. In this case, we only defined our algorithms, but not how they actually work. That means that finding algorithms that fulfill this security definition is another feat entirely.
Security games are usually split up into two players: an adversary and a challenger. The adversary is typically given some level of power (in this case, a polynomial-time adversary can run any algorithm, so long as it runs in polynomial time), and represents all possible actors trying to break your protocol.
Lastly, the adversary's advantage models how likely the adversary is to win the game. We typically want the adversary's advantage to be negligible, which has a specific mathematical definition but can be thought of as super-polynomially small. Usually this means either essentially 0 or essentialy 1/2 (in the above example, we want the adversary's advantage to be 1/2 - that is, they don't do any better than guessing randomly).
The example game we showed is itself the security property. If we were to find algorithms that can beat the adversary in this game, then we can be certain it fulfills this definition, and use it with some level of peace of mind. Note, however, that not all security definitions are made equal, and some are stronger than others. Some have an adversary that has more computational power, have access to more information, have the ability to perform more tasks, etc. The security of a protocol reduces only to the properties that it fulfills.
Reductions
TODO:
Assumptions
TODO: Falsifiable, non-falsifiable