Lecture 04
Lecture 04
1
High-Level
High-Level View
View
– unconstrained adversary
– exact numbers
• a scheme is (t, ε)-secure if an adversary running for time at most t
has probability of most ε in breaking the security of the scheme
– what values of t and ε are reasonable today?
• (t, ε)-security does not imply security in general
Computational
Computational Security
Security
– asymptotic approach
• cipher is described using a security parameter n
• a scheme is secure if an efficient adversary has only negligible
probability in breaking its security
– adversary runs in probabilistic polynomial time (PPT)
probability 2 2 0 · 2 − n / 4
– example:
– block ciphers
• the key has a fixed size
• prior to encryption, the message is partitioned into blocks of
certain size
• each block is encrypted and decrypted on its own
– stream ciphers
• the message is processed as a stream
• pseudo-random generator is used to produce a long key stream from
a short fixed-length key
Computationally-Secure
Computationally-Secure Encryption
Encryption
2.
3.
Computationally-Secure
Computationally-Secure Encryption
Encryption
• Experiment PrivKea
A ,E ( n )
v
1. A is given 1 n and chooses two messages m 0 , m 1 of the same length
2. random key k is generated by Gen (1 n ), and random bit b ← {0, 1 } is
chosen
• What is pseudorandomness?
| P r [ D ( r ) = 1] − P r [ D ( G ( s ) ) = 1]| ≤ negl(n)
where r and s are random strings of size l ( n ) and n
– this property completely fails if D is computationally unbounded
– security of X :
– security of Y :
Proving
Proving Security
Security of
of Our
Our Encryption
Encryption Scheme
Scheme
• Once this is done, we analyze its success and relate it to that of A’s success
in breaking encryption experiment
Beyond
Beyond Simplified
Simplified Model
Model
• How do we encrypt
– variable-length messages
– multiple messages
• Variable-length messages
– RC4