Public Key Cryptography
2022-03-24 23:01:57 0 举报
AI智能生成
Public Key Cryptography
作者其他创作
大纲/内容
proposed in 1970
authentication: sig for software update
textbookRSA
OWF: exponentiation modulo
trapdoor: sk d
three simple attacks
online vote: deterministic
cube roots: padding scheme
Jacobi symbol: Semantic security
not security
no IND-CPA security
no OWE-CCA security
formal defination
kappa: security parameter
not necessarily
the same as the “key length
the same as the “key length
KeyGen, En: O(k^c) for c \in N
De: polynomial-time
benchmark
M_kappa and C_kappa (not only depend on kappa)
Security of Encryption
attack goals
total break
One way encryption (OWE)
Semantic security
Indistinguishability (IND)
success probability: function of kappa
noticable
perfect adversary
attack models
Passive attack/chosen plaintext attack (CPA)
Lunchtime attack (CCA1)
Adaptive chosen-ciphertext attack (CCA)
security notion
strongest: IND-CCA security
Security of Signatures
attack goals
Total break
Selective forgery
Existential forgery
strong forgery
attack models
Passive attack
Known message attack
Adaptive chosen-message attack (CMA)
security notion
UF-CMA security
0 条评论
下一页