




Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Some concept of Cryptography are Block Ciphers, Classical Cryptography, Computational, Cryptanalysis, Digital Signatures, Knowledge Proofs, Number Theory, One Way Functions, Perfect Secrecy, Perfect Secrecy. Main points of this lecture are: Perfect Secrecy, Shannon Secrecy, Knowing Ciphertext, Variable, Random Variable, Plaintexts, Ciphertexts, Random Variable, Possible Plaintext, Cryptosystem
Typology: Slides
1 / 8
This page cannot be seen from the preview
Don't miss anything!
2
Knowing ciphertext doesn’t help decipher:
X - random variable for plaintexts
C - random variable for ciphertexts with respect to possible plaintext and keys DEF 1 : A cryptosystem is Shannon secure if X and C are independent. I.e., for all plaintexts x and ciphertexts y Pr[ x | y ] = Pr[ x ].
C depends on implicit rand. var. K for keys
4
If any plaintext message could result from a given ciphertext message and all keys equally likely, no knowledge gained about plaintexts. DEF3: A cryptosystem with equal size spaces is perfectly key ambiguous if keys are picked uniformly and for all there is a unique key K such that.
5
XOR the plaintext bitstring with key but never re-use same key
Similar to Vigenère but with size of key equaling size of message DEF: The one time pad (OTP) is the cryptosystem defined by and , with keys chosen according to uniform distribution. THM: OTP is perfectly key ambiguous.
n
7
Very large key-size
Stateful : Alice and Bob must keep track of “state” - prone to transmission errors
Abuse (using twice) results in easily attacked cipher
Useless for other cryptographic protocols such as authentication
8
Resistance to all known attacks
Computational security - cracking would solve impossibly hard problem I. Total break - recover key II. Partial break - can decrypt ciphertexts, without knowing key III. Semantic break - can learn a “bit” of information about plaintext, so can distinguish ciphertexts