SlideShare a Scribd company logo
1 of 24
© Thibault de Valroger - 2015© Thibault de Valroger - 2015
What is Deep Random Secrecy ?
Thibault de Valroger
tdevalroger@gmail.com
September 2015
© Thibault de Valroger - 2015
What is Deep Random Secrecy ?
• A new kind of cryptographic method, designed to
resist to unlimitedly powered opponents
• Based on a new kind of randomized information,
such that probability distribution is made
unknowledgeable for external observers
• Made to enable partners to exchange data with
perfect security even if they don’t share priorly
any secret common information
© Thibault de Valroger - 2015
Why building such a mehod ?
• Existing methods to securely exchange data :
– Or rely on unproven hypothesis of hardness, like public key cryptography.
• P≠NP conjecture may happen to be proven as false
• Quantum computing is likely to cause most of those methods to collapse within the next
decades to come
– Or rely on setup procedures that are complex to roll out and potentially
breachable, like one time pad
– Or rely on hypothesis about the environment that are difficult if not
impossible to verify in practice, such as memory bounded adversaries or
idependant noisy channels
– Or rely on physical theories that are not proven and make the system difficult
to build and use, like quantum cryptography or chaos cryptography
• Securing information exchange is about managing risk of interception. If
the information is really sensitive, the risk shall be zero
© Thibault de Valroger - 2015
What is the concept ?
• To run Deep Random Secrecy, 2 partners
need:
– A Deep Random Generator (DRG) for each one,
that they can run on their own
– A Perfect Secrecy Protocol (PSP) that they can
execute together
– And of course a classical communication
environment that does not need any particular
characteristics
© Thibault de Valroger - 2015
What is the concept ?
Degradation:
Reduce the accuracy of the signal
Bayesian Inference: 𝑃(𝑋 = 𝑥 𝐼 = 𝑖) =
𝜒(𝑖,𝑥)𝛷(𝑥)
𝜒 𝑖,𝑥 𝛷 𝑥 𝑑𝑥
Need to know the probability distribution Φ !
Private random
information: 𝑋
with distribution
𝑃 𝑋 = 𝑥 = Φ(𝑥)
Public degraded
information: 𝐼
𝑃(𝐼 = 𝑖 𝑋 = 𝑥) = 𝜒(𝑖, 𝑥)
© Thibault de Valroger - 2015
What is the concept ?
If you know the
distibution, the
inference from public
information is easy
???
If you don’t, any secret
information is a priori as
much possible as another
knowing the public
information
© Thibault de Valroger - 2015
What is the concept ?
DRG Alice
Partner Alice
Φ(𝑥) = ? ? ?
PSP role Alice
DRG Bob
Partner Bob
Φ′(𝑦) = ? ? ?
PSP role Bob⋮
𝑥 𝑦Private random
information for Alice
Private random
information for Bob
𝑖
Public information
degraded form 𝑥
and published by
Alice
𝑗
Public information
degraded form 𝑦
and published by Bob
Estimation of secret
shared information by
Alice = 𝑽 𝑨(𝒙, 𝒋)
Estimation of secret
shared information by
Bob = 𝑽 𝑩(𝒚, 𝒊)
Estimation of secret shared
information by Mallory = 𝑽 𝑴(𝒊, 𝒋)
𝑽 𝑴(𝒊, 𝒋) 𝑽 𝑨 𝒐𝒓 𝑽 𝑩
? ? ?
Opponent
Mallory
No possible Bayesian inference if Φ and Φ’ are unknown
© Thibault de Valroger - 2015
How to figure Degradation concept ?
A definition first: 𝑉 being a random variable with
values in 𝐸, a random variable 𝑉′ with values in
𝐹 is said « engendered by 𝑉 » iff there exists an
engendering distribution 𝜓: 𝐸 × 𝐹 ⟶ [0,1] of
𝑉′ such that:
∀𝑥 ∈ 𝐸,
𝑦∈𝐹
𝜓 𝑥, 𝑦 𝜕𝑦 = 1
𝑃 𝑉′
= 𝑦 𝑉 = 𝑥 = 𝜓 𝑥, 𝑦
© Thibault de Valroger - 2015
How to figure Degradation concept ?
A simple example then (the « quantum analogy »):
• Let 𝑉 be a binary random variable with parameter
𝜃/𝑘 with θ ∈ [0,1] and 𝑘 > 1
• An observer wants to engender another binary
random variable 𝑉′ from 𝑉 with first moment
(expectation) = 𝜃 : the only possibility is 𝑉′
= 𝑘𝑉
• Then the second moment (variance) of 𝑉′ is then
larger than for 𝑉 which means that 𝑉′ is less
accurate than 𝑉
𝜃 → 𝜃/𝑘
is a degradation transformation of a binary
random variable with parameter 𝜃
© Thibault de Valroger - 2015
How to figure Degradation concept ?
The Quantum analogy
𝑉 a binary random variable with
parameter 𝜃
𝑄 a quantum particule
𝜃 → 𝜃/𝑘, the degradation of 𝑉
Choice of a measurement instrument. A
measurement instrument is capturing only
a « partial view » of quantum reality
Experiment of 𝑉′ degraded variable of 𝑉 Measurement of 𝑄
Impossibility to engender a random
variable from 𝑉′ with same mean and
variance than 𝑉
Heisenberg uncertainty principle:
impossibility to reliably measure both
position and speed
Deep Random Secrecy relies on this
principle, but Bayesian inference shall
be overcome by sophisticated methods
Benefit from Heisenberg principle at
macroscopic scale for cryptography needs
complex systems
© Thibault de Valroger - 2015
What is a Deep Random Generator ?
• In an effort to govern uncertainty
with a set of logical rules, Laplace
expressed the Principle of
insufficient reason:
« if you know nothing about the
probability of occurrence of 2 events,
you should consider them as equaliy
likely »
© Thibault de Valroger - 2015
What is a Deep Random Generator ?
• The theoretical approach is based on a new axiomatic: the
Deep Random Axiom (as a modern version of Laplace’s
principle)
Formulation 1:
 𝑋 and 𝑌 being 2 random variables ; if 𝑋 has a secret distribution for
Mallory, then:
Formulation 2:
 𝑋, 𝑋′ being 2 random variables with values in 𝐸, and 𝑌 being a random
variable with values in 𝐹 engendered from any variable with values in
𝐸; if 𝑋, 𝑋′ have secret distribution for Mallory, then:
𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 has no dependency with probability distribution of 𝑿
𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 = 𝑬 𝒇(𝑿′) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚
© Thibault de Valroger - 2015
What is a Deep Random Generator ?
In practice, Deep Random can be generated from computing ressources
Alice emulates internally the PSP playing the roles of Alice, Bob and Mallory
Step 𝑚 − 1:
𝜔 𝑚−1 is the best
strategy knowing the
past distributions Φ𝑗,
𝑗 ≤ 𝑚 − 1
Step 𝑚:
Φ 𝑚 is a new distribution that makes
𝜔 𝑚−1unefficient for the given PSP
…
The PSP must be such that
whatever is 𝜔 the strategy of the
opponent, there exists a
distribution for each partner such
that 𝜔 becomes unefficient
t t
Alice’s DRG Alice needs for a
« secret » distribution
at a given moment 𝑡 𝑚
The DRG generates a
draw with Φ 𝑚 for Alice
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• A PSP (Perfect Secrecy Protocol) is a
communication protocol in which:
– Legitimate partners make use of Deep Random
Generation
– Published information is obtained by Degradation
transformation of secret information generated by
DRG
– The legitimate partners have an advantage when they
estimate say 𝑉𝐴 compared to the opponent who
estimate 𝑉𝐴 from the public information under the
hypothesis of the Deep Random Axiom
• Let’s see hereafter what that means
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• Under the hypothesis of the Deep Random
Axiom, a reversible transformation in the
sample space do not change the perception of
the probability distribution for the opponent
• In other (technical) words, one can consider 𝐺
any group of transformations in the sample
space, such that for any 𝑔 ∈ 𝐺, Φ(𝑥) and Φ ∘
𝑔(𝑥) are undistinguishable for the opponent
under Deep Random Axiom
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• This means then that you can reasonnably
assume that the probability distribution is
restricted for the opponent to an invariant class
by group 𝐺
• Or in other words, that the only distributions that
shall be considered by the opponent are of the
form:
1
𝐺
𝑔∈𝐺
Φ ∘ 𝑔(𝑥)
Φ
≜ Δ 𝐺
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• This kind of restriction over the set of
distributions to be considered by the opponent,
also induces a restriction over the set of relevant
strategies to use for the opponent,
• This restriced set of strategies is:
𝜔 𝑖, 𝑗 = 𝐸 𝑉𝐴 (𝑖, 𝑗 and Φ, Φ′ ∈ Δ 𝐺] Φ,Φ′ ≜ Ω 𝐺
© Thibault de Valroger - 2015
How to build a Perfect Secrecy
Protocol ?
• Then you can manage to build a Perfect Secrecy
Protocol if:
Inf 𝜔∈Ω 𝐺
𝐸 (𝜔 − 𝑉𝐴)2
> 𝐸 (𝑉𝐵 − 𝑉𝐴)2
• More precisely, when you are there, you have
created « Advantage Distillation » for the
legitimate partners. Perfect Secrecy can then be
obtained by « Reconciliation » and « Privacy
Amplification » techniques.
• See
http://crypto.cs.mcgill.ca/~crepeau/COMP649/04.
00476316.pdf for a good understanding of those
notions
© Thibault de Valroger - 2015
Independence Phenomenon
• In pratical, Perfect Secrecy Protocols are not easy to
design because:
– You need to implement a DRG (see before)
– You need to overcome the Independence Phonomenon
• The Independence Phenomenon is basically the fact
that, even if the distributions chosen by Alice and Bob
are totally unknown for the opponent Mallory, he, at
least, knows that they have been chosen idependently
because Alice and Bob don’t know each other before
the transaction
• This gives a huge information to Mallory, and Perfect
Secrecy Protocols have to discard this information by
clever (and complex) « synchronization process »
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• Can all this really work ??
• Good new is YES ! (I believe so), and the
simple fact that it is possible is a surprising
result (apparently contradicting Shannon
impossibility Theorem)
• An example is presented with proven
security : http://arxiv.org/abs/1507.08258
• But the story is far from being over
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• If such a Perfect Secrecy Protocol exists, then
the next question is: what is the best one ?
• Typically the best one is
the one consuming less
network banwidth
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• We thus define a new kind of entropy
– 𝜀 the bit error rate of the protocol
– 𝜀′ the bit knowledge rate of the opponent enabled by the
protocol
– 𝐻 𝑉𝐴 the entropy (classic) of the legitimate shared secret
estimation by 𝐴
– 𝑄 the quantity of information exchanged through the protocol
• Then the Reliability rate is defined intuitively by
𝑅 = 1 − 𝜀 − 𝜀′
• And the entropy to measure the perfectly reliable
information obtained through the protocol 𝒫 is defined
intuitively by
𝐻(𝒫) ≜ 𝐻 𝑉𝐴 𝒫 × max(0, 𝑅 𝒫 )
© Thibault de Valroger - 2015
The Cryptologic Limit Quest
• The search of the Cryptologic Limit is then the search
of:
𝐶 = sup 𝒫
𝐻(𝒫)
𝑄(𝒫)
• in other words, the less greedy Perfectly Secure
Protocol (under Deep Random Axiom)
• Hope you will join the Quest !
© Thibault de Valroger - 2015
That’s all (here) folks !
• Want serious reading with detailed
explanations and hard calculations ?
(will not cure your scratching head)
• Want to discuss the idea ?
• Want to insult the heretic ?
• Headached ?
http://arxiv.org/abs
/1507.08258
tdevalroger@gmail.com

More Related Content

Similar to Deep Random Secrecy Presentation

Robustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning MethodsRobustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning MethodsData Science Milan
 
Market Basket Analysis in SQL Server Machine Learning Services
Market Basket Analysis in SQL Server Machine Learning ServicesMarket Basket Analysis in SQL Server Machine Learning Services
Market Basket Analysis in SQL Server Machine Learning ServicesLuca Zavarella
 
Slides for "Do Deep Generative Models Know What They Don't know?"
Slides for "Do Deep Generative Models Know What They Don't know?"Slides for "Do Deep Generative Models Know What They Don't know?"
Slides for "Do Deep Generative Models Know What They Don't know?"Julius Hietala
 
Distributed computing for new bloods
Distributed computing for new bloodsDistributed computing for new bloods
Distributed computing for new bloodsRaymond Tay
 
CMG15 Session 525
CMG15 Session 525 CMG15 Session 525
CMG15 Session 525 Alex Gilgur
 
forecasting model
forecasting modelforecasting model
forecasting modelFEG
 
Estimating default risk in fund structures
Estimating default risk in fund structuresEstimating default risk in fund structures
Estimating default risk in fund structuresIFMR
 
Supervised learning: Types of Machine Learning
Supervised learning: Types of Machine LearningSupervised learning: Types of Machine Learning
Supervised learning: Types of Machine LearningLibya Thomas
 
[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®Nelson Brito
 
Rsqrd AI - ML Interpretability: Beyond Feature Importance
Rsqrd AI - ML Interpretability: Beyond Feature ImportanceRsqrd AI - ML Interpretability: Beyond Feature Importance
Rsqrd AI - ML Interpretability: Beyond Feature ImportanceAlessya Visnjic
 
The Fast Fourier Transform in Finance (Presentacion).pdf
The Fast Fourier Transform in Finance (Presentacion).pdfThe Fast Fourier Transform in Finance (Presentacion).pdf
The Fast Fourier Transform in Finance (Presentacion).pdfmaikelcorleoni
 
Wiring the IoT for modern manufacturing
Wiring the IoT for modern manufacturingWiring the IoT for modern manufacturing
Wiring the IoT for modern manufacturingFlorent Solt
 
Outlier analysis and anomaly detection
Outlier analysis and anomaly detectionOutlier analysis and anomaly detection
Outlier analysis and anomaly detectionShantanuDeosthale
 
Probability distribution in R
Probability distribution in RProbability distribution in R
Probability distribution in RAlichy Sowmya
 
Strata 2014 Anomaly Detection
Strata 2014 Anomaly DetectionStrata 2014 Anomaly Detection
Strata 2014 Anomaly DetectionTed Dunning
 
Uncertain volatillity Models
Uncertain volatillity ModelsUncertain volatillity Models
Uncertain volatillity ModelsLuigi Piva CQF
 
Planning for Uncertainty
Planning for UncertaintyPlanning for Uncertainty
Planning for UncertaintyMarcin Czenko
 
Influx/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron SchwartzInflux/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron SchwartzInfluxData
 

Similar to Deep Random Secrecy Presentation (20)

Robustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning MethodsRobustness Metrics for ML Models based on Deep Learning Methods
Robustness Metrics for ML Models based on Deep Learning Methods
 
Market Basket Analysis in SQL Server Machine Learning Services
Market Basket Analysis in SQL Server Machine Learning ServicesMarket Basket Analysis in SQL Server Machine Learning Services
Market Basket Analysis in SQL Server Machine Learning Services
 
Slides for "Do Deep Generative Models Know What They Don't know?"
Slides for "Do Deep Generative Models Know What They Don't know?"Slides for "Do Deep Generative Models Know What They Don't know?"
Slides for "Do Deep Generative Models Know What They Don't know?"
 
Distributed computing for new bloods
Distributed computing for new bloodsDistributed computing for new bloods
Distributed computing for new bloods
 
Everybody Lies
Everybody LiesEverybody Lies
Everybody Lies
 
CMG15 Session 525
CMG15 Session 525 CMG15 Session 525
CMG15 Session 525
 
forecasting model
forecasting modelforecasting model
forecasting model
 
Estimating default risk in fund structures
Estimating default risk in fund structuresEstimating default risk in fund structures
Estimating default risk in fund structures
 
Mini datathon
Mini datathonMini datathon
Mini datathon
 
Supervised learning: Types of Machine Learning
Supervised learning: Types of Machine LearningSupervised learning: Types of Machine Learning
Supervised learning: Types of Machine Learning
 
[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®
 
Rsqrd AI - ML Interpretability: Beyond Feature Importance
Rsqrd AI - ML Interpretability: Beyond Feature ImportanceRsqrd AI - ML Interpretability: Beyond Feature Importance
Rsqrd AI - ML Interpretability: Beyond Feature Importance
 
The Fast Fourier Transform in Finance (Presentacion).pdf
The Fast Fourier Transform in Finance (Presentacion).pdfThe Fast Fourier Transform in Finance (Presentacion).pdf
The Fast Fourier Transform in Finance (Presentacion).pdf
 
Wiring the IoT for modern manufacturing
Wiring the IoT for modern manufacturingWiring the IoT for modern manufacturing
Wiring the IoT for modern manufacturing
 
Outlier analysis and anomaly detection
Outlier analysis and anomaly detectionOutlier analysis and anomaly detection
Outlier analysis and anomaly detection
 
Probability distribution in R
Probability distribution in RProbability distribution in R
Probability distribution in R
 
Strata 2014 Anomaly Detection
Strata 2014 Anomaly DetectionStrata 2014 Anomaly Detection
Strata 2014 Anomaly Detection
 
Uncertain volatillity Models
Uncertain volatillity ModelsUncertain volatillity Models
Uncertain volatillity Models
 
Planning for Uncertainty
Planning for UncertaintyPlanning for Uncertainty
Planning for Uncertainty
 
Influx/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron SchwartzInflux/Days 2017 San Francisco | Baron Schwartz
Influx/Days 2017 San Francisco | Baron Schwartz
 

Recently uploaded

Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 

Recently uploaded (20)

Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 

Deep Random Secrecy Presentation

  • 1. © Thibault de Valroger - 2015© Thibault de Valroger - 2015 What is Deep Random Secrecy ? Thibault de Valroger tdevalroger@gmail.com September 2015
  • 2. © Thibault de Valroger - 2015 What is Deep Random Secrecy ? • A new kind of cryptographic method, designed to resist to unlimitedly powered opponents • Based on a new kind of randomized information, such that probability distribution is made unknowledgeable for external observers • Made to enable partners to exchange data with perfect security even if they don’t share priorly any secret common information
  • 3. © Thibault de Valroger - 2015 Why building such a mehod ? • Existing methods to securely exchange data : – Or rely on unproven hypothesis of hardness, like public key cryptography. • P≠NP conjecture may happen to be proven as false • Quantum computing is likely to cause most of those methods to collapse within the next decades to come – Or rely on setup procedures that are complex to roll out and potentially breachable, like one time pad – Or rely on hypothesis about the environment that are difficult if not impossible to verify in practice, such as memory bounded adversaries or idependant noisy channels – Or rely on physical theories that are not proven and make the system difficult to build and use, like quantum cryptography or chaos cryptography • Securing information exchange is about managing risk of interception. If the information is really sensitive, the risk shall be zero
  • 4. © Thibault de Valroger - 2015 What is the concept ? • To run Deep Random Secrecy, 2 partners need: – A Deep Random Generator (DRG) for each one, that they can run on their own – A Perfect Secrecy Protocol (PSP) that they can execute together – And of course a classical communication environment that does not need any particular characteristics
  • 5. © Thibault de Valroger - 2015 What is the concept ? Degradation: Reduce the accuracy of the signal Bayesian Inference: 𝑃(𝑋 = 𝑥 𝐼 = 𝑖) = 𝜒(𝑖,𝑥)𝛷(𝑥) 𝜒 𝑖,𝑥 𝛷 𝑥 𝑑𝑥 Need to know the probability distribution Φ ! Private random information: 𝑋 with distribution 𝑃 𝑋 = 𝑥 = Φ(𝑥) Public degraded information: 𝐼 𝑃(𝐼 = 𝑖 𝑋 = 𝑥) = 𝜒(𝑖, 𝑥)
  • 6. © Thibault de Valroger - 2015 What is the concept ? If you know the distibution, the inference from public information is easy ??? If you don’t, any secret information is a priori as much possible as another knowing the public information
  • 7. © Thibault de Valroger - 2015 What is the concept ? DRG Alice Partner Alice Φ(𝑥) = ? ? ? PSP role Alice DRG Bob Partner Bob Φ′(𝑦) = ? ? ? PSP role Bob⋮ 𝑥 𝑦Private random information for Alice Private random information for Bob 𝑖 Public information degraded form 𝑥 and published by Alice 𝑗 Public information degraded form 𝑦 and published by Bob Estimation of secret shared information by Alice = 𝑽 𝑨(𝒙, 𝒋) Estimation of secret shared information by Bob = 𝑽 𝑩(𝒚, 𝒊) Estimation of secret shared information by Mallory = 𝑽 𝑴(𝒊, 𝒋) 𝑽 𝑴(𝒊, 𝒋) 𝑽 𝑨 𝒐𝒓 𝑽 𝑩 ? ? ? Opponent Mallory No possible Bayesian inference if Φ and Φ’ are unknown
  • 8. © Thibault de Valroger - 2015 How to figure Degradation concept ? A definition first: 𝑉 being a random variable with values in 𝐸, a random variable 𝑉′ with values in 𝐹 is said « engendered by 𝑉 » iff there exists an engendering distribution 𝜓: 𝐸 × 𝐹 ⟶ [0,1] of 𝑉′ such that: ∀𝑥 ∈ 𝐸, 𝑦∈𝐹 𝜓 𝑥, 𝑦 𝜕𝑦 = 1 𝑃 𝑉′ = 𝑦 𝑉 = 𝑥 = 𝜓 𝑥, 𝑦
  • 9. © Thibault de Valroger - 2015 How to figure Degradation concept ? A simple example then (the « quantum analogy »): • Let 𝑉 be a binary random variable with parameter 𝜃/𝑘 with θ ∈ [0,1] and 𝑘 > 1 • An observer wants to engender another binary random variable 𝑉′ from 𝑉 with first moment (expectation) = 𝜃 : the only possibility is 𝑉′ = 𝑘𝑉 • Then the second moment (variance) of 𝑉′ is then larger than for 𝑉 which means that 𝑉′ is less accurate than 𝑉 𝜃 → 𝜃/𝑘 is a degradation transformation of a binary random variable with parameter 𝜃
  • 10. © Thibault de Valroger - 2015 How to figure Degradation concept ? The Quantum analogy 𝑉 a binary random variable with parameter 𝜃 𝑄 a quantum particule 𝜃 → 𝜃/𝑘, the degradation of 𝑉 Choice of a measurement instrument. A measurement instrument is capturing only a « partial view » of quantum reality Experiment of 𝑉′ degraded variable of 𝑉 Measurement of 𝑄 Impossibility to engender a random variable from 𝑉′ with same mean and variance than 𝑉 Heisenberg uncertainty principle: impossibility to reliably measure both position and speed Deep Random Secrecy relies on this principle, but Bayesian inference shall be overcome by sophisticated methods Benefit from Heisenberg principle at macroscopic scale for cryptography needs complex systems
  • 11. © Thibault de Valroger - 2015 What is a Deep Random Generator ? • In an effort to govern uncertainty with a set of logical rules, Laplace expressed the Principle of insufficient reason: « if you know nothing about the probability of occurrence of 2 events, you should consider them as equaliy likely »
  • 12. © Thibault de Valroger - 2015 What is a Deep Random Generator ? • The theoretical approach is based on a new axiomatic: the Deep Random Axiom (as a modern version of Laplace’s principle) Formulation 1:  𝑋 and 𝑌 being 2 random variables ; if 𝑋 has a secret distribution for Mallory, then: Formulation 2:  𝑋, 𝑋′ being 2 random variables with values in 𝐸, and 𝑌 being a random variable with values in 𝐹 engendered from any variable with values in 𝐸; if 𝑋, 𝑋′ have secret distribution for Mallory, then: 𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 has no dependency with probability distribution of 𝑿 𝑬 𝒇(𝑿) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚 = 𝑬 𝒇(𝑿′) 𝒀 𝑴𝒂𝒍𝒍𝒐𝒓𝒚
  • 13. © Thibault de Valroger - 2015 What is a Deep Random Generator ? In practice, Deep Random can be generated from computing ressources Alice emulates internally the PSP playing the roles of Alice, Bob and Mallory Step 𝑚 − 1: 𝜔 𝑚−1 is the best strategy knowing the past distributions Φ𝑗, 𝑗 ≤ 𝑚 − 1 Step 𝑚: Φ 𝑚 is a new distribution that makes 𝜔 𝑚−1unefficient for the given PSP … The PSP must be such that whatever is 𝜔 the strategy of the opponent, there exists a distribution for each partner such that 𝜔 becomes unefficient t t Alice’s DRG Alice needs for a « secret » distribution at a given moment 𝑡 𝑚 The DRG generates a draw with Φ 𝑚 for Alice
  • 14. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • A PSP (Perfect Secrecy Protocol) is a communication protocol in which: – Legitimate partners make use of Deep Random Generation – Published information is obtained by Degradation transformation of secret information generated by DRG – The legitimate partners have an advantage when they estimate say 𝑉𝐴 compared to the opponent who estimate 𝑉𝐴 from the public information under the hypothesis of the Deep Random Axiom • Let’s see hereafter what that means
  • 15. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • Under the hypothesis of the Deep Random Axiom, a reversible transformation in the sample space do not change the perception of the probability distribution for the opponent • In other (technical) words, one can consider 𝐺 any group of transformations in the sample space, such that for any 𝑔 ∈ 𝐺, Φ(𝑥) and Φ ∘ 𝑔(𝑥) are undistinguishable for the opponent under Deep Random Axiom
  • 16. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • This means then that you can reasonnably assume that the probability distribution is restricted for the opponent to an invariant class by group 𝐺 • Or in other words, that the only distributions that shall be considered by the opponent are of the form: 1 𝐺 𝑔∈𝐺 Φ ∘ 𝑔(𝑥) Φ ≜ Δ 𝐺
  • 17. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • This kind of restriction over the set of distributions to be considered by the opponent, also induces a restriction over the set of relevant strategies to use for the opponent, • This restriced set of strategies is: 𝜔 𝑖, 𝑗 = 𝐸 𝑉𝐴 (𝑖, 𝑗 and Φ, Φ′ ∈ Δ 𝐺] Φ,Φ′ ≜ Ω 𝐺
  • 18. © Thibault de Valroger - 2015 How to build a Perfect Secrecy Protocol ? • Then you can manage to build a Perfect Secrecy Protocol if: Inf 𝜔∈Ω 𝐺 𝐸 (𝜔 − 𝑉𝐴)2 > 𝐸 (𝑉𝐵 − 𝑉𝐴)2 • More precisely, when you are there, you have created « Advantage Distillation » for the legitimate partners. Perfect Secrecy can then be obtained by « Reconciliation » and « Privacy Amplification » techniques. • See http://crypto.cs.mcgill.ca/~crepeau/COMP649/04. 00476316.pdf for a good understanding of those notions
  • 19. © Thibault de Valroger - 2015 Independence Phenomenon • In pratical, Perfect Secrecy Protocols are not easy to design because: – You need to implement a DRG (see before) – You need to overcome the Independence Phonomenon • The Independence Phenomenon is basically the fact that, even if the distributions chosen by Alice and Bob are totally unknown for the opponent Mallory, he, at least, knows that they have been chosen idependently because Alice and Bob don’t know each other before the transaction • This gives a huge information to Mallory, and Perfect Secrecy Protocols have to discard this information by clever (and complex) « synchronization process »
  • 20. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • Can all this really work ?? • Good new is YES ! (I believe so), and the simple fact that it is possible is a surprising result (apparently contradicting Shannon impossibility Theorem) • An example is presented with proven security : http://arxiv.org/abs/1507.08258 • But the story is far from being over
  • 21. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • If such a Perfect Secrecy Protocol exists, then the next question is: what is the best one ? • Typically the best one is the one consuming less network banwidth
  • 22. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • We thus define a new kind of entropy – 𝜀 the bit error rate of the protocol – 𝜀′ the bit knowledge rate of the opponent enabled by the protocol – 𝐻 𝑉𝐴 the entropy (classic) of the legitimate shared secret estimation by 𝐴 – 𝑄 the quantity of information exchanged through the protocol • Then the Reliability rate is defined intuitively by 𝑅 = 1 − 𝜀 − 𝜀′ • And the entropy to measure the perfectly reliable information obtained through the protocol 𝒫 is defined intuitively by 𝐻(𝒫) ≜ 𝐻 𝑉𝐴 𝒫 × max(0, 𝑅 𝒫 )
  • 23. © Thibault de Valroger - 2015 The Cryptologic Limit Quest • The search of the Cryptologic Limit is then the search of: 𝐶 = sup 𝒫 𝐻(𝒫) 𝑄(𝒫) • in other words, the less greedy Perfectly Secure Protocol (under Deep Random Axiom) • Hope you will join the Quest !
  • 24. © Thibault de Valroger - 2015 That’s all (here) folks ! • Want serious reading with detailed explanations and hard calculations ? (will not cure your scratching head) • Want to discuss the idea ? • Want to insult the heretic ? • Headached ? http://arxiv.org/abs /1507.08258 tdevalroger@gmail.com