hemanta k. maji - purdue universityhemanta k. maji cryptography and security. cryptography &...

23
Hemanta K. Maji Cryptography and Security

Upload: others

Post on 13-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Hemanta K. Maji

Cryptography and Security

Page 2: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Cryptography & Security

Page 3: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Cryptography & Security

Science of providing Controlled Access to Information

Page 4: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Cryptography & Security

Science of providing Controlled Access to Information

“Who learns what,” and

Page 5: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Cryptography & Security

Science of providing Controlled Access to Information

“Who learns what,” and

“Who influences what”

Page 6: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Cryptography & Security

Science of providing Controlled Access to Information

“Who learns what,” and

“Who influences what”

Goal: Discover Laws of Nature through the Lens of Security & Privacy using Mathematical Tools

Page 7: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Laws of Nature: Examples

Page 8: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Channel Capacity: Law of Information Throughput

Laws of Nature: ExamplesShannon

Page 9: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Channel Capacity: Law of Information Throughput

Circuit Complexity: Cost of Computation

Laws of Nature: ExamplesShannon

Turing

Cook Karp

Levin

Page 10: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

My Perspective & Goal

Page 11: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

My Perspective & Goal

Cryptography is founded upon Atomic Components

Page 12: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

My Perspective & Goal

Cryptography is founded upon Atomic Components

Law of “Privacy Throughput”

Transmuting various forms of Atomic Components of Privacy at Optimal Rate

Page 13: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

My Perspective & Goal

Cryptography is founded upon Atomic Components

Law of “Privacy Throughput”

Transmuting various forms of Atomic Components of Privacy at Optimal Rate

Cost of “Privacy-preserving Computation”

Securely Computing using Minimal Atomic Components

Page 14: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

Page 15: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

x2 x3

xnx1

Page 16: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

x2 x3

xnx1

Page 17: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

x2 x3

xnx1

Page 18: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

Page 19: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

With: Maximum Resource Efficiency

Page 20: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

With: Maximum Resource Efficiency

Using: Noisy Channels, Secure Hardware, Hardware Tokens, Conservative Computational Assumptions

Page 21: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Applications: Secure Computation

With: Maximum Resource Efficiency

Using: Noisy Channels, Secure Hardware, Hardware Tokens, Conservative Computational Assumptions

Despite: Sophisticated Adversarial Attacks, like Leakage and Tampering

Page 22: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Summary

Understand: Law of “Privacy Cost”

Closely Correlated with the Practice of Cryptography

For example: Secure Computation

Page 23: Hemanta K. Maji - Purdue UniversityHemanta K. Maji Cryptography and Security. Cryptography & Security. Cryptography & Security Science of providing Controlled Access to Information

Thanks