CS178 - intro to cryptography

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:12 AM on 2/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

general strategy

  1. identify

  2. translate into probability

  3. look for invariance under XOR or randomness

2
New cards

negligible functions strategy

  1. simplify

  2. is 1/n negligible

3
New cards

ensembles strategy

  1. check length

  2. check independence

  3. build simple test

4
New cards

perfect/semi-perfect/multi-message security strategy

  1. implication (chain equalities or counterexample)

  2. multi-message security (key reuse, partial leakage, repeated structure)

5
New cards

hybrid technique strategy

indistinguishability does not equal identical

6
New cards

pseudorandom generator strategy

  1. construction validity

  2. range-size

  3. expansion construction

7
New cards

uniform

every possible value is equally likely

8
New cards

private key encryption correctness

m = m’

Pr[Dec(k,c) → m : Gen(λ) → k, Enc(k,m) → c] = 1

9
New cards

formal security definition

adversary a:

  1. chooses m0, m1

  2. challenger picks b in {0,1}

  3. returns Enc(k, mb)

  4. A outputs guesses b’

wins if b = b’

secured if Pr[A wins] <= ½ + negligible(n)

10
New cards

one-time pad

  • key is truly random

  • key length = message length

  • used only one

  • encryption: XOR c = m XOR k

11
New cards

double one-time pag

encrypt messages twice using two INDEPENDent one-time pads

  • pick random keys, k1, k2

  • compute c = m XOR k1 XOR k2

(k = k1 XOR k2)

12
New cards

one-time perfect security

ciphertext reveals ZERO info about message

  • key is random

  • key length >= message length

  • key is only used once

13
New cards

hybrid technique

  1. generate random symmetric key

  2. encrypt it w/ recipient’s public key

  3. use symmetric key for bulk data

14
New cards

monotonicity property

Security improves as n grows and never regresses.

15
New cards

negligible functions

for every polynomial p(n): f(n) < 1/p(n)

“goes to 0 faster than any inverse polynomial”

used to measure acceptable attacker advantage

1/poly(n) : NO

2-poly(n) : YES

16
New cards

multi-message security

adversary can see MANY ciphertexts, not just one and still must not learn anything useful

17
New cards

computational indistinguishability

  • used when perfect security is impossible

  • Distributions may differ, but no efficient algorithm can exploit the difference.

  • two ensembles Xn, Yn

  • for all PPT distinguishers : |Pr[D(Xn) = 1 - Pr[D(Yn) = 1] | <= negligible

18
New cards

pseudorandom generators (PRG)

  • deterministic: G: {0,1}n → {0,1}m

  • efficient, expands length, output indistinguishable from uniform

  • start key → PRG → long key → OTP-style expansion

19
New cards

one-way functions

  • easy to compute, hard to invert

  • PRGS exists IFF OWS exists