We now discuss a theoretical result on the security of cryptosystems. We ask whether perfect ciphers exists, i.e., ciphers that can never be broken, even with after an unlimited time. Interestingly, we will see that these ideal ciphers exist and can be implemented in practice but they are, in fact, unpractical. The theory, developed by Claude Shannon, assumes an *only-ciphertext* model of the attacker, i.e., the attacker only knows the ciphertext y and tries to find plaintext x or key k.

We call the probability of a plaintext x to occur and the probability of a certain key k to be used as encryption key. These two probability distributions induce a probability distribution on the ciphertexts. In fact, given a plaintext and a key there exists a unique corresponding ciphertext.

We can compute such a probability distribution as follows

Given a ciphertext y we look for all the keys that can give such a ciphertext from some plaintext x. We then sum the probability of all such keys times the probability of the corresponding plaintext.

We can also compute the conditional probability of a ciphertext y with respect to a plaintext x. This gives a measure of how likely is a certain ciphertext once we fix a plaintext.

It is simply the sum of the probability of all keys giving y from x.

**Example**. Consider the following toy-cipher with , and . Encryption is defined by the following table:

We let , , . Let us now compute

.

In fact, is the only key giving ciphertext 1. More interestingly, we can compute the conditional probability of ciphertext 1 with respect to the two plaintexts a and b:

Notice, in particular, that 1 can never be obtained from b.

Once we have these values, the idea is to compute the conditional probability of a plaintext with respect to a ciphertext. This is very related to the security of the cipher, since it is a measure of how likely is a plaintext once a ciphertext is observed (which is what the attacker is usually interested to know). Interestingly, this conditional probability can be computed through that Bayes theorem:

**Example**. We can now compute the probabilities of plaintexts a and b with respect to ciphertext 1. We obtain:

Thus, when observing 1 we are sure it is plaintext a, meaning that this cipher is completely insecure. The same happen if we compute the probabilities of a and b when observing 3. For ciphertext 2 we have an interesting, less extreme, situation. We obtain, in fact, and , thus a is more likely than b when 2 is observed. This might suggest that even for this ciphertext the attacker gains information (even if partial) about the plaintext. However, it is important to notice that , , i.e., that the probability of the two plaintexts, when 2 is observed, is exactly the one they occur in a message. In fact, observing 3 does not change anything.

We now give the definition of perfect cipher:

**Definition (Perfect cipher)**. A cipher is perfect iff for all and .

Intuitively, a cipher is perfect if observing a ciphertext y gives no information about any of the possible plaintexts x. The cipher in the example is far from being perfect, but it satisfies the above definition for ciphertext 2.

**Exercise**.* Prove that shift cipher with , i.e., with keys picked at random for each letter of the plaintex, is a perfect cipher.*

**Solution**. Shift cipher is defined as with . We compute the probability of a generic ciphertext y as:

The last two steps hold since for each key k, we always have a plaintext that gives y when encrypted under k. This plaintext is exactly . So the constraint always holds and . Then, it is sufficient to observe that for all possible keys gives exactly the set of all possible plaintexts and the sum of all their probabilities gives 1. We can now compute

Here it is enough to observe that, given x and y, there exists a unique key that encrypts x as y, which is precisely . Now Bayes theorem gives:

which gives the thesis.

We have seen that if we change key any time we encrypt a letter, a cipher as simple as the shift cipher becomes perfect, i.e., unbreakable. We now present two general results that, in fact, show that this strong requirement is indeed necessary and we cannot hope to develop perfect ciphers without it.

**Theorem 1**.* Let for all y. A cipher is perfect only if .*

The theorem states a necessary condition of a cipher to be perfect: it must be that the number of keys is at least the same as the number of plaintexts. To see why this holds, we first notice that by Bayes theorem we have that a cipher is perfect if an only if for all and . If we fix we obtain that for each y meaning that there exists at least one key k such that (otherwise we would have ). Notice also that all such keys are different since is a function and we have fixed x. In fact, x cannot be mapped to two different ciphertexts by the same key. Thus we have at least one key for each ciphertext meaning that . Since, for any cipher, injects the set of plaintexts into the set of ciphertext, we also have , which gives the thesis .

**Exercise**. *Prove that the ciphertext defined as is not perfect.*

**Solution 1**. We notice that the cipher uses the same key to encrypt a whole tuple of d letters. Formally we have and . We can directly apply the above theorem noticing that . Thus the cipher is not perfect.

**Solution 2**. There is an alternative, more direct, method to prove this fact, using a counterexample. We consider a possible plaintext GOOFY with d=5. Since the word can occur we have (GOOFY) > 0. Now it is enough to exhibit a ciphertext that cannot be obtained from GOOFY with the above cipher. Since it applies the very same shift to all the letters, it is enough to pick a word that cannot be obtained from GOOFY in that way. For example AAAAA or GOOFZ or ABCDE. For these ciphertexts we have (GOOFY|AAAAA) = (GOOFY|GOOFZ) = (GOOFY|ABCDE) = 0 (GOOFY). Thus for such pairs of plaintext/ciphertext the property of perfect ciphers does not hold meaning that the cipher is not perfect.

We conclude by giving a characterizations of perfect ciphers in the case .

**Theorem 2**. *Let . A cipher is perfect if and only if*

- for all
- for each and there exists exactly one key such that

Intuitively, the theorem states that for a cipher to be perfect (under the hypothesis that the size of the set of plaintexts, ciphertexts and key is the same) keys should be picked at random for any encryption and each plaintext is mapped into each ciphertext through a unique key.

**Proof:** We prove that a perfect cipher implies the two above conditions. We leave the other side of the implication as an exercise. In Theorem 1 we have seen that, for perfect ciphers, if we fix we obtain that for each y meaning that there exists at least one key k such that and all of these keys are different. Thus we have . In this theorem we have assumed , meaning that all of these keys k are unique (otherwise we would have ). Since this holds for each and we have proved condition 2. To prove condition 1, it is enough to notice that , i.e., the probability of y given x is equal to the probability of the unique key k that encrypts x into y. Thus, . If we fix y and we consider all possible plaintexts x we obtain all possible keys k and for all of them it holds , with constant. Given that the sum of the probability of all keys must be 1, we obtain which proves condition 1.

#### The one-time-pad

We conclude giving a famous example of a perfect cipher that has been used in practice. This cipher has been used for the telegraph and is a binary variant of Vigenére with keys picked at random. More precisely we have with for all . Encryption is defined as where is the bitwise xor operation. We notice that the premise of Theorem 2 holds (set sizes are the same). Also condition 1 holds, i.e., . We only need to prove condition 2. Let and . We have that the unique key giving y from x is computed as , i.e., . We thus conclude that the cipher is perfect.

#### Lesson learned

Shannon theory on perfect ciphers shows that such ideal ciphers exist but require as many keys as the possible plaintexts, and keys need to be picked at random for each encryption. Even if this makes such ciphers unpractical, the one-time-pad has been used for real transmission. The setup consisted of two identical books with thousands of “random” keys. Each key was used once (from which the name one-time). Once the book had been used completely, new shared books were necessary.

#### Challenge: the four-time-pad (gives extra score)

It has been intercepted the following message encrypted under the mysterious four-time-pad cipher. We need skilled cryptanalysts to crack it. Would you help us, please?

1 2 3 4 |
1307061700190d1a1d061445430c020b56111653541e0a011c00021a084519154915 290b4f0752010b000f0b53490d0902174d151b491b06415331481248094905121d54 33070e100003010502471745001d141554541b481d1b4f1e00530409084557160018 2b4f1c074f060d490f0953451b1b1f04005f5e00151c4f150c4e16044f450f000455 |