






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Some concept of Cryptography are Block Ciphers, Classical Cryptography, Computational, Cryptanalysis, Digital Signatures, Knowledge Proofs, Number Theory, One Way Functions, Perfect Secrecy, Perfect Secrecy. Main points of this lecture are: Probabilistic Encryption, Symmetric Encryption Scheme, Message Space, Key Space, Randomized, Key Generator Picks, Security Parameter, Algorithm Producing, Ciphertext, Algorithm Producing Plaintexts
Typology: Slides
1 / 12
This page cannot be seen from the preview
Don't miss anything!
2
DEF: A symmetric encryption scheme consists of a tuple ( M, K, G, E, D ) where
M - message space
K - key space
G - randomized key generator picks key k of security parameter l. Write:
E - randomized (possibly stateful ) encryption algorithm producing ciphertext from key and plaintext. Write:
D - determinisic (possibly stateful) decryption algorithm producing plaintexts from ciphertexts s.t.
R
R
l
4
E ( n, m ) // key n , message m L = | m | // r picked uniformly at random s = BBS-PRG( n, r, L ) t = bitstring( ) // keep leading 0’s return ( m s ) || t // xor and concatenate NOTES:
2 L + 1
5
INPUT: key n , seed r , expansion L OUTPUT: bitstring s of length L BBS-PRG( n, r, L ) // for i = 1 to L { // least significant bit // replace by square } return // concatenate bits
2
2
7
DEF: A multi-message distinguisher for an encryption scheme ( M, K, G, E, D ) is a decision algorithm A that attempts to discover which of two chosen message-sequences a cipher-sequence corresponds to. Define the the a-b advantage of A :
8
DEF: Let ( M, K, G, E, D ) be an encryption scheme with G, E, D running in poly-time. The scheme is computationally in secure if there is a PPT multi-message distinguisher A with non-negligible a-b advantage for some equal-size messages. I.e. can find a poly- number of messages , with but non-negligible.
Measure time/space/negligibility in terms of security parameter l for the key generator.
Say computationally secure if not computationally insecure - no such A exists.
10
DEF: A function is non-negligible if there is a polynomial p ( n ) such that
11
THM: Any stateless, deterministic encryption is insecure. In fact, there is an adversary A with advantage 1 for some well chosen message sequences. NOTE: One-time-pad avoids this problem because under this paradigm, there is an implicit counter whose value > 1 implies encryption is refused and the output “ ” is returned for any plaintext.