SlideShare a Scribd company logo
© Thibault de Valroger - 2015© Thibault de Valroger - 2015
What is Deep Random Secrecy ?
Thibault de Valroger
tdevalroger@gmail.com
September 2015
© Thibault de Valroger - 2015
What is Deep Random Secrecy ?
• A new kind of cryptographic method, designed to
resist to unlimitedly powered opponents
• Based on a new kind of randomized information,
such that probability distribution is made
unknowledgeable for external observers
• Made to enable partners to exchange data with
perfect security even if they don’t share priorly
any secret common information
© Thibault de Valroger - 2015
Why building such a mehod ?
• Existing methods to securely exchange data :
– Or rely on unproven hypothesis of hardness, like public key cryptography.
• P≠NP conjecture may happen to be proven as false
• Quantum computing is likely to cause most of those methods to collapse within the next
decades to come
– Or rely on setup procedures that are complex to roll out and potentially
breachable, like one time pad
– Or rely on hypothesis about the environment that are difficult if not
impossible to verify in practice, such as memory bounded adversaries or
idependant noisy channels
– Or rely on physical theories that are not proven and make the system difficult
to build and use, like quantum cryptography or chaos cryptography
• Securing information exchange is about managing risk of interception. If
the information is really sensitive, the risk shall be zero
© Thibault de Valroger - 2015
What is the concept ?
• To run Deep Random Secrecy, 2 partners
need:
– A Deep Random Generator (DRG) for each one,
that they can run on their own
– A Perfect Secrecy Protocol (PSP) that they can
execute together
– And of course a classical communication
environment that does not need any particular
characteristics
© Thibault de Valroger - 2015
What is the concept ?
Degradation:
Reduce the accuracy of the signal
Bayesian Inference: 𝑃(𝑋 = 𝑥 𝐼 = 𝑖) =
𝜒(𝑖,𝑥)𝛷(𝑥)
𝜒 𝑖,𝑥 𝛷 𝑥 𝑑𝑥
Need to know the probability distribution Φ !
Private random
information: 𝑋
with distribution
𝑃 𝑋 = 𝑥 = Φ(𝑥)
Public degraded
information: 𝐼
𝑃(𝐼 = 𝑖 𝑋 = 𝑥) = 𝜒(𝑖, 𝑥)
© Thibault de Valroger - 2015
What is the concept ?
If you know the
distibution, the
inference from public
information is easy
???
If you don’t, any secret
information is a priori as
much possible as another
knowing the public
information
© Thibault de Valroger - 2015
What is the concept ?
DRG Alice
Partner Alice
Φ(𝑥) = ? ? ?
PSP role Alice
DRG Bob
Partner Bob
Φ′(𝑦) = ? ? ?
PSP role Bob⋮
𝑥 𝑦Private random
information for Alice
Private random
information for Bob
𝑖
Public information
degraded form 𝑥
and published by
Alice
𝑗
Public information
degraded form 𝑦
and published by Bob
Estimation of secret
shared information by
Alice = 𝑽 𝑨(𝒙, 𝒋)
Estimation of secret
shared information by
Bob = 𝑽 𝑩(𝒚, 𝒊)
Estimation of secret shared
information by Mallory = 𝑽 𝑴(𝒊, 𝒋)
𝑽 𝑴(𝒊, 𝒋) 𝑽 𝑨 𝒐𝒓 𝑽 𝑩
? ? ?
Opponent
Mallory
No possible Bayesian inference if Φ and Φ’ are unknown
© Thibault de Valroger - 2015
How to figure Degradation concept ?
A definition first: 𝑉 being a random variable with
values in 𝐸, a random variable 𝑉′ with values in
𝐹 is said « engendered by 𝑉 » iff there exists an
engendering distribution 𝜓: 𝐸 × 𝐹 ⟶ [0,1] of
𝑉′ such that:
∀𝑥 ∈ 𝐸,
𝑦∈𝐹
𝜓 𝑥, 𝑦 𝜕𝑦 = 1
𝑃 𝑉′
= 𝑦 𝑉 = 𝑥 = 𝜓 𝑥, 𝑦
© Thibault de Valroger - 2015
How to figure Degradation concept ?
A simple example then (the « quantum analogy »):
• Let 𝑉 be a binary random variable with parameter
𝜃/𝑘 with θ ∈ [0,1] and 𝑘 > 1
• An observer wants to engender another binary
random variable 𝑉′ from 𝑉 with first moment
(expectation) = 𝜃 : the only possibility is 𝑉′
= 𝑘𝑉
• Then the second moment (variance) of 𝑉′ is then
larger than for 𝑉 which means that 𝑉′ is less
accurate than 𝑉
𝜃 → 𝜃/𝑘
is a degradation transformation of a binary
random variable with parameter 𝜃
© Thibault de Valroger - 2015
How to figure Degradation concept ?
The Quantum analogy
𝑉 a binary random variable with
parameter 𝜃
𝑄 a quantum particule
𝜃 → 𝜃/𝑘, the degradation of 𝑉
Choice of a measurement instrument. A
measurement instrument is capturing only
a « partial view » of quantum reality
Experiment of 𝑉′ degraded variable of 𝑉 Measurement of 𝑄
Impossibility to engender a random
variable from 𝑉′ with same mean and
variance than 𝑉
Heisenberg uncertainty principle:
impossibility to reliably measure both
position and speed
Deep Random Secrecy relies on this
principle, but Bayesian inference shall
be overcome by sophisticated methods
Benefit from Heisenberg principle at
macroscopic scale for cryptography needs
complex systems
© Thibault de Valroger - 2015
What is a Deep Random Generator ?
• In an effort to govern uncertainty
with a set of logical rules, Laplace
expressed the Principle of
insufficient reason:
« if you know nothing about the
probability of occurrence of 2 events,
you should consider them as equaliy
likely »
© Thibault de Valroger - 2015
What is a Deep Random Generator ?
• The theoretical approach is based on a new axiomatic: the
Deep Random Axiom (as a modern version of Laplace’s
principle)
Formulation 1:
 𝑋 and 𝑌 being 2 random variables ; if 𝑋 has a secret distribution for
Mallory, then:
Formulation 2:
 𝑋, 𝑋′ being 2 random variables with values in 𝐸, and 𝑌 being a random
variable with values in 𝐹 engendered from any variable with values in
𝐸; if 𝑋, 𝑋′ have secret distribution for Mallory, then:
𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 has no dependency with probability distribution of 𝑿
𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 = 𝑬 𝒇(𝑿′) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚
© Thibault de Valroger - 2015
What is a Deep Random Generator ?
In practice, Deep Random can be generated from computing ressources
Alice emulates internally the PSP playing the roles of Alice, Bob and Mallory
Step 𝑚 − 1:
𝜔 𝑚−1 is the best
strategy knowing the
past distributions Φ𝑗,
𝑗 ≤ 𝑚 − 1
Step 𝑚:
Φ 𝑚 is a new distribution that makes
𝜔 𝑚−1unefficient for the given PSP
…
The PSP must be such that
whatever is 𝜔 the strategy of the
opponent, there exists a
distribution for each partner such
that 𝜔 becomes unefficient
t t
Alice’s DRG Alice needs for a
« secret » distribution
at a given moment 𝑡 𝑚
The DRG generates a
draw with Φ 𝑚 for Alice
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• A PSP (Perfect Secrecy Protocol) is a
communication protocol in which:
– Legitimate partners make use of Deep Random
Generation
– Published information is obtained by Degradation
transformation of secret information generated by
DRG
– The legitimate partners have an advantage when they
estimate say 𝑉𝐴 compared to the opponent who
estimate 𝑉𝐴 from the public information under the
hypothesis of the Deep Random Axiom
• Let’s see hereafter what that means
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• Under the hypothesis of the Deep Random
Axiom, a reversible transformation in the
sample space do not change the perception of
the probability distribution for the opponent
• In other (technical) words, one can consider 𝐺
any group of transformations in the sample
space, such that for any 𝑔 ∈ 𝐺, Φ(𝑥) and Φ ∘
𝑔(𝑥) are undistinguishable for the opponent
under Deep Random Axiom
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• This means then that you can reasonnably
assume that the probability distribution is
restricted for the opponent to an invariant class
by group 𝐺
• Or in other words, that the only distributions that
shall be considered by the opponent are of the
form:
1
𝐺
𝑔∈𝐺
Φ ∘ 𝑔(𝑥)
Φ
≜ Δ 𝐺
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• This kind of restriction over the set of
distributions to be considered by the opponent,
also induces a restriction over the set of relevant
strategies to use for the opponent,
• This restriced set of strategies is:
𝜔 𝑖, 𝑗 = 𝐸 𝑉𝐴 (𝑖, 𝑗 and Φ, Φ′ ∈ Δ 𝐺] Φ,Φ′ ≜ Ω 𝐺
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• Then you can manage to build a Perfect Secrecy
Protocol if:
Inf 𝜔∈Ω 𝐺
𝐸 (𝜔 − 𝑉𝐴)2
> 𝐸 (𝑉𝐵 − 𝑉𝐴)2
• More precisely, when you are there, you have
created « Advantage Distillation » for the
legitimate partners. Perfect Secrecy can then be
obtained by « Reconciliation » and « Privacy
Amplification » techniques.
• See
http://crypto.cs.mcgill.ca/~crepeau/COMP649/04.
00476316.pdf for a good understanding of those
notions
© Thibault de Valroger - 2015
Independence Phenomenon
• In pratical, Perfect Secrecy Protocols are not easy to
design because:
– You need to implement a DRG (see before)
– You need to overcome the Independence Phonomenon
• The Independence Phenomenon is basically the fact
that, even if the distributions chosen by Alice and Bob
are totally unknown for the opponent Mallory, he, at
least, knows that they have been chosen idependently
because Alice and Bob don’t know each other before
the transaction
• This gives a huge information to Mallory, and Perfect
Secrecy Protocols have to discard this information by
clever (and complex) « synchronization process »
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• Can all this really work ??
• Good new is YES ! (I believe so), and the
simple fact that it is possible is a surprising
result (apparently contradicting Shannon
impossibility Theorem)
• An example is presented with proven
security : http://arxiv.org/abs/1507.08258
• But the story is far from being over
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• If such a Perfect Secrecy Protocol exists, then
the next question is: what is the best one ?
• Typically the best one is
the one consuming less
network banwidth
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• We thus define a new kind of entropy
– 𝜀 the bit error rate of the protocol
– 𝜀′ the bit knowledge rate of the opponent enabled by the
protocol
– 𝐻 𝑉𝐴 the entropy (classic) of the legitimate shared secret
estimation by 𝐴
– 𝑄 the quantity of information exchanged through the protocol
• Then the Reliability rate is defined intuitively by
𝑅 = 1 − 𝜀 − 𝜀′
• And the entropy to measure the perfectly reliable
information obtained through the protocol 𝒫 is defined
intuitively by
𝐻(𝒫) ≜ 𝐻 𝑉𝐴 𝒫 × max(0, 𝑅 𝒫 )
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• The search of the Cryptologic Limit is then the search
of:
𝐶 = sup 𝒫
𝐻(𝒫)
𝑄(𝒫)
• in other words, the less greedy Perfectly Secure
Protocol (under Deep Random Axiom)
• Hope you will join the Quest !
© Thibault de Valroger - 2015
That’s all (here) folks !
• Want serious reading with detailed
explanations and hard calculations ?
(will not cure your scratching head)
• Want to discuss the idea ?
• Want to insult the heretic ?
• Headached ?
http://arxiv.org/abs
/1507.08258
tdevalroger@gmail.com

More Related Content

DOCX
new resume
DOCX
104374766 case-study-pnuemonia
DOCX
159740814 case-studies
PDF
音録(オドロク)プレゼン資料
PDF
Metodos
PPTX
Project based learning presentation
PDF
DOCX
108987151 case-laxmikant
new resume
104374766 case-study-pnuemonia
159740814 case-studies
音録(オドロク)プレゼン資料
Metodos
Project based learning presentation
108987151 case-laxmikant

Similar to Deep Random Secrecy Presentation (20)

PDF
Robustness Metrics for ML Models based on Deep Learning Methods
PDF
Market Basket Analysis in SQL Server Machine Learning Services
PPTX
Slides for "Do Deep Generative Models Know What They Don't know?"
PDF
Distributed computing for new bloods
PDF
Everybody Lies
PDF
CMG15 Session 525
PDF
forecasting model
 
PPTX
Estimating default risk in fund structures
PDF
Mini datathon
PPTX
Supervised learning: Types of Machine Learning
PDF
[PH-Neutral 0x7db] Exploit Next Generation®
PDF
Rsqrd AI - ML Interpretability: Beyond Feature Importance
PDF
The Fast Fourier Transform in Finance (Presentacion).pdf
PDF
Wiring the IoT for modern manufacturing
PPTX
Outlier analysis and anomaly detection
PPTX
Probability distribution in R
PDF
Strata 2014 Anomaly Detection
DOCX
Uncertain volatillity Models
PDF
Planning for Uncertainty
PDF
Resolving e commerce challenges with probabilistic programming
Robustness Metrics for ML Models based on Deep Learning Methods
Market Basket Analysis in SQL Server Machine Learning Services
Slides for "Do Deep Generative Models Know What They Don't know?"
Distributed computing for new bloods
Everybody Lies
CMG15 Session 525
forecasting model
 
Estimating default risk in fund structures
Mini datathon
Supervised learning: Types of Machine Learning
[PH-Neutral 0x7db] Exploit Next Generation®
Rsqrd AI - ML Interpretability: Beyond Feature Importance
The Fast Fourier Transform in Finance (Presentacion).pdf
Wiring the IoT for modern manufacturing
Outlier analysis and anomaly detection
Probability distribution in R
Strata 2014 Anomaly Detection
Uncertain volatillity Models
Planning for Uncertainty
Resolving e commerce challenges with probabilistic programming
Ad

Recently uploaded (20)

PDF
bbec55_b34400a7914c42429908233dbd381773.pdf
PPTX
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PPT
protein biochemistry.ppt for university classes
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
2Systematics of Living Organisms t-.pptx
PPTX
microscope-Lecturecjchchchchcuvuvhc.pptx
PPTX
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
PDF
Sciences of Europe No 170 (2025)
PPTX
BIOMOLECULES PPT........................
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PPTX
2. Earth - The Living Planet Module 2ELS
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PDF
HPLC-PPT.docx high performance liquid chromatography
PPTX
7. General Toxicologyfor clinical phrmacy.pptx
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PDF
Biophysics 2.pdffffffffffffffffffffffffff
bbec55_b34400a7914c42429908233dbd381773.pdf
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
protein biochemistry.ppt for university classes
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
. Radiology Case Scenariosssssssssssssss
2Systematics of Living Organisms t-.pptx
microscope-Lecturecjchchchchcuvuvhc.pptx
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
Sciences of Europe No 170 (2025)
BIOMOLECULES PPT........................
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
2. Earth - The Living Planet Module 2ELS
Comparative Structure of Integument in Vertebrates.pptx
HPLC-PPT.docx high performance liquid chromatography
7. General Toxicologyfor clinical phrmacy.pptx
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Biophysics 2.pdffffffffffffffffffffffffff
Ad

Deep Random Secrecy Presentation

  • 1. © Thibault de Valroger - 2015© Thibault de Valroger - 2015 What is Deep Random Secrecy ? Thibault de Valroger tdevalroger@gmail.com September 2015
  • 2. © Thibault de Valroger - 2015 What is Deep Random Secrecy ? • A new kind of cryptographic method, designed to resist to unlimitedly powered opponents • Based on a new kind of randomized information, such that probability distribution is made unknowledgeable for external observers • Made to enable partners to exchange data with perfect security even if they don’t share priorly any secret common information
  • 3. © Thibault de Valroger - 2015 Why building such a mehod ? • Existing methods to securely exchange data : – Or rely on unproven hypothesis of hardness, like public key cryptography. • P≠NP conjecture may happen to be proven as false • Quantum computing is likely to cause most of those methods to collapse within the next decades to come – Or rely on setup procedures that are complex to roll out and potentially breachable, like one time pad – Or rely on hypothesis about the environment that are difficult if not impossible to verify in practice, such as memory bounded adversaries or idependant noisy channels – Or rely on physical theories that are not proven and make the system difficult to build and use, like quantum cryptography or chaos cryptography • Securing information exchange is about managing risk of interception. If the information is really sensitive, the risk shall be zero
  • 4. © Thibault de Valroger - 2015 What is the concept ? • To run Deep Random Secrecy, 2 partners need: – A Deep Random Generator (DRG) for each one, that they can run on their own – A Perfect Secrecy Protocol (PSP) that they can execute together – And of course a classical communication environment that does not need any particular characteristics
  • 5. © Thibault de Valroger - 2015 What is the concept ? Degradation: Reduce the accuracy of the signal Bayesian Inference: 𝑃(𝑋 = 𝑥 𝐼 = 𝑖) = 𝜒(𝑖,𝑥)𝛷(𝑥) 𝜒 𝑖,𝑥 𝛷 𝑥 𝑑𝑥 Need to know the probability distribution Φ ! Private random information: 𝑋 with distribution 𝑃 𝑋 = 𝑥 = Φ(𝑥) Public degraded information: 𝐼 𝑃(𝐼 = 𝑖 𝑋 = 𝑥) = 𝜒(𝑖, 𝑥)
  • 6. © Thibault de Valroger - 2015 What is the concept ? If you know the distibution, the inference from public information is easy ??? If you don’t, any secret information is a priori as much possible as another knowing the public information
  • 7. © Thibault de Valroger - 2015 What is the concept ? DRG Alice Partner Alice Φ(𝑥) = ? ? ? PSP role Alice DRG Bob Partner Bob Φ′(𝑦) = ? ? ? PSP role Bob⋮ 𝑥 𝑦Private random information for Alice Private random information for Bob 𝑖 Public information degraded form 𝑥 and published by Alice 𝑗 Public information degraded form 𝑦 and published by Bob Estimation of secret shared information by Alice = 𝑽 𝑨(𝒙, 𝒋) Estimation of secret shared information by Bob = 𝑽 𝑩(𝒚, 𝒊) Estimation of secret shared information by Mallory = 𝑽 𝑴(𝒊, 𝒋) 𝑽 𝑴(𝒊, 𝒋) 𝑽 𝑨 𝒐𝒓 𝑽 𝑩 ? ? ? Opponent Mallory No possible Bayesian inference if Φ and Φ’ are unknown
  • 8. © Thibault de Valroger - 2015 How to figure Degradation concept ? A definition first: 𝑉 being a random variable with values in 𝐸, a random variable 𝑉′ with values in 𝐹 is said « engendered by 𝑉 » iff there exists an engendering distribution 𝜓: 𝐸 × 𝐹 ⟶ [0,1] of 𝑉′ such that: ∀𝑥 ∈ 𝐸, 𝑦∈𝐹 𝜓 𝑥, 𝑦 𝜕𝑦 = 1 𝑃 𝑉′ = 𝑦 𝑉 = 𝑥 = 𝜓 𝑥, 𝑦
  • 9. © Thibault de Valroger - 2015 How to figure Degradation concept ? A simple example then (the « quantum analogy »): • Let 𝑉 be a binary random variable with parameter 𝜃/𝑘 with θ ∈ [0,1] and 𝑘 > 1 • An observer wants to engender another binary random variable 𝑉′ from 𝑉 with first moment (expectation) = 𝜃 : the only possibility is 𝑉′ = 𝑘𝑉 • Then the second moment (variance) of 𝑉′ is then larger than for 𝑉 which means that 𝑉′ is less accurate than 𝑉 𝜃 → 𝜃/𝑘 is a degradation transformation of a binary random variable with parameter 𝜃
  • 10. © Thibault de Valroger - 2015 How to figure Degradation concept ? The Quantum analogy 𝑉 a binary random variable with parameter 𝜃 𝑄 a quantum particule 𝜃 → 𝜃/𝑘, the degradation of 𝑉 Choice of a measurement instrument. A measurement instrument is capturing only a « partial view » of quantum reality Experiment of 𝑉′ degraded variable of 𝑉 Measurement of 𝑄 Impossibility to engender a random variable from 𝑉′ with same mean and variance than 𝑉 Heisenberg uncertainty principle: impossibility to reliably measure both position and speed Deep Random Secrecy relies on this principle, but Bayesian inference shall be overcome by sophisticated methods Benefit from Heisenberg principle at macroscopic scale for cryptography needs complex systems
  • 11. © Thibault de Valroger - 2015 What is a Deep Random Generator ? • In an effort to govern uncertainty with a set of logical rules, Laplace expressed the Principle of insufficient reason: « if you know nothing about the probability of occurrence of 2 events, you should consider them as equaliy likely »
  • 12. © Thibault de Valroger - 2015 What is a Deep Random Generator ? • The theoretical approach is based on a new axiomatic: the Deep Random Axiom (as a modern version of Laplace’s principle) Formulation 1:  𝑋 and 𝑌 being 2 random variables ; if 𝑋 has a secret distribution for Mallory, then: Formulation 2:  𝑋, 𝑋′ being 2 random variables with values in 𝐸, and 𝑌 being a random variable with values in 𝐹 engendered from any variable with values in 𝐸; if 𝑋, 𝑋′ have secret distribution for Mallory, then: 𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 has no dependency with probability distribution of 𝑿 𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 = 𝑬 𝒇(𝑿′) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚
  • 13. © Thibault de Valroger - 2015 What is a Deep Random Generator ? In practice, Deep Random can be generated from computing ressources Alice emulates internally the PSP playing the roles of Alice, Bob and Mallory Step 𝑚 − 1: 𝜔 𝑚−1 is the best strategy knowing the past distributions Φ𝑗, 𝑗 ≤ 𝑚 − 1 Step 𝑚: Φ 𝑚 is a new distribution that makes 𝜔 𝑚−1unefficient for the given PSP … The PSP must be such that whatever is 𝜔 the strategy of the opponent, there exists a distribution for each partner such that 𝜔 becomes unefficient t t Alice’s DRG Alice needs for a « secret » distribution at a given moment 𝑡 𝑚 The DRG generates a draw with Φ 𝑚 for Alice
  • 14. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • A PSP (Perfect Secrecy Protocol) is a communication protocol in which: – Legitimate partners make use of Deep Random Generation – Published information is obtained by Degradation transformation of secret information generated by DRG – The legitimate partners have an advantage when they estimate say 𝑉𝐴 compared to the opponent who estimate 𝑉𝐴 from the public information under the hypothesis of the Deep Random Axiom • Let’s see hereafter what that means
  • 15. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • Under the hypothesis of the Deep Random Axiom, a reversible transformation in the sample space do not change the perception of the probability distribution for the opponent • In other (technical) words, one can consider 𝐺 any group of transformations in the sample space, such that for any 𝑔 ∈ 𝐺, Φ(𝑥) and Φ ∘ 𝑔(𝑥) are undistinguishable for the opponent under Deep Random Axiom
  • 16. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • This means then that you can reasonnably assume that the probability distribution is restricted for the opponent to an invariant class by group 𝐺 • Or in other words, that the only distributions that shall be considered by the opponent are of the form: 1 𝐺 𝑔∈𝐺 Φ ∘ 𝑔(𝑥) Φ ≜ Δ 𝐺
  • 17. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • This kind of restriction over the set of distributions to be considered by the opponent, also induces a restriction over the set of relevant strategies to use for the opponent, • This restriced set of strategies is: 𝜔 𝑖, 𝑗 = 𝐸 𝑉𝐴 (𝑖, 𝑗 and Φ, Φ′ ∈ Δ 𝐺] Φ,Φ′ ≜ Ω 𝐺
  • 18. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • Then you can manage to build a Perfect Secrecy Protocol if: Inf 𝜔∈Ω 𝐺 𝐸 (𝜔 − 𝑉𝐴)2 > 𝐸 (𝑉𝐵 − 𝑉𝐴)2 • More precisely, when you are there, you have created « Advantage Distillation » for the legitimate partners. Perfect Secrecy can then be obtained by « Reconciliation » and « Privacy Amplification » techniques. • See http://crypto.cs.mcgill.ca/~crepeau/COMP649/04. 00476316.pdf for a good understanding of those notions
  • 19. © Thibault de Valroger - 2015 Independence Phenomenon • In pratical, Perfect Secrecy Protocols are not easy to design because: – You need to implement a DRG (see before) – You need to overcome the Independence Phonomenon • The Independence Phenomenon is basically the fact that, even if the distributions chosen by Alice and Bob are totally unknown for the opponent Mallory, he, at least, knows that they have been chosen idependently because Alice and Bob don’t know each other before the transaction • This gives a huge information to Mallory, and Perfect Secrecy Protocols have to discard this information by clever (and complex) « synchronization process »
  • 20. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • Can all this really work ?? • Good new is YES ! (I believe so), and the simple fact that it is possible is a surprising result (apparently contradicting Shannon impossibility Theorem) • An example is presented with proven security : http://arxiv.org/abs/1507.08258 • But the story is far from being over
  • 21. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • If such a Perfect Secrecy Protocol exists, then the next question is: what is the best one ? • Typically the best one is the one consuming less network banwidth
  • 22. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • We thus define a new kind of entropy – 𝜀 the bit error rate of the protocol – 𝜀′ the bit knowledge rate of the opponent enabled by the protocol – 𝐻 𝑉𝐴 the entropy (classic) of the legitimate shared secret estimation by 𝐴 – 𝑄 the quantity of information exchanged through the protocol • Then the Reliability rate is defined intuitively by 𝑅 = 1 − 𝜀 − 𝜀′ • And the entropy to measure the perfectly reliable information obtained through the protocol 𝒫 is defined intuitively by 𝐻(𝒫) ≜ 𝐻 𝑉𝐴 𝒫 × max(0, 𝑅 𝒫 )
  • 23. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • The search of the Cryptologic Limit is then the search of: 𝐶 = sup 𝒫 𝐻(𝒫) 𝑄(𝒫) • in other words, the less greedy Perfectly Secure Protocol (under Deep Random Axiom) • Hope you will join the Quest !
  • 24. © Thibault de Valroger - 2015 That’s all (here) folks ! • Want serious reading with detailed explanations and hard calculations ? (will not cure your scratching head) • Want to discuss the idea ? • Want to insult the heretic ? • Headached ? http://arxiv.org/abs /1507.08258 tdevalroger@gmail.com