1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
general strategy
identify
translate into probability
look for invariance under XOR or randomness
negligible functions strategy
simplify
is 1/n negligible
ensembles strategy
check length
check independence
build simple test
perfect/semi-perfect/multi-message security strategy
implication (chain equalities or counterexample)
multi-message security (key reuse, partial leakage, repeated structure)
hybrid technique strategy
indistinguishability does not equal identical
pseudorandom generator strategy
construction validity
range-size
expansion construction
uniform
every possible value is equally likely
private key encryption correctness
m = m’
Pr[Dec(k,c) → m : Gen(λ) → k, Enc(k,m) → c] = 1
formal security definition
adversary a:
chooses m0, m1
challenger picks b in {0,1}
returns Enc(k, mb)
A outputs guesses b’
wins if b = b’
secured if Pr[A wins] <= ½ + negligible(n)
one-time pad
key is truly random
key length = message length
used only one
encryption: XOR c = m XOR k
double one-time pag
encrypt messages twice using two INDEPENDent one-time pads
pick random keys, k1, k2
compute c = m XOR k1 XOR k2
(k = k1 XOR k2)
one-time perfect security
ciphertext reveals ZERO info about message
key is random
key length >= message length
key is only used once
hybrid technique
generate random symmetric key
encrypt it w/ recipient’s public key
use symmetric key for bulk data
monotonicity property
Security improves as n grows and never regresses.
negligible functions
for every polynomial p(n): f(n) < 1/p(n)
“goes to 0 faster than any inverse polynomial”
used to measure acceptable attacker advantage
1/poly(n) : NO
2-poly(n) : YES
multi-message security
adversary can see MANY ciphertexts, not just one and still must not learn anything useful
computational indistinguishability
used when perfect security is impossible
Distributions may differ, but no efficient algorithm can exploit the difference.
two ensembles Xn, Yn
for all PPT distinguishers : |Pr[D(Xn) = 1 - Pr[D(Yn) = 1] | <= negligible
pseudorandom generators (PRG)
deterministic: G: {0,1}n → {0,1}m
efficient, expands length, output indistinguishable from uniform
start key → PRG → long key → OTP-style expansion
one-way functions
easy to compute, hard to invert
PRGS exists IFF OWS exists