Lecture 10 Asymmetric Encryption

نویسندگان

  • Chris Peikert
  • Joel Odom
چکیده

Recall that in the last lecture we discussed cryptographic security in the symmetric setting. The typical arrangement is that Alice and Bob share a common key that they use for encryption and decryption. This shared secret creates an distinction between the communicating parties (Alice and Bob) and the adversarial eavesdropper (Eve). The goal in this setting is to ensure that without the shared secret key, Eve will not be able to learn anything about the messages being sent between Alice and Bob (except, of course, the fact that Alice and Bob are communicating via messages from a known space). Perfect secrecy (equivalently, Shannon secrecy) is typically impractical in the symmetric setting because it requires that the shared key be at least as large as any message sent, and each key may only be used once. For practicality, we relaxed our notion of perfect secrecy to allow for a computationally bounded adversary, and we arrived at the notion of indistinguishability under (adaptive) chosen plaintext attack (IND-CPA). In this security notion, we allow a computationally bounded adversary access to an encryption oracle Enck(·) and a challenge oracle Ck(·, ·). The adversary may make (a polynomially bounded number of) calls to the encryption oracle, adapting its queries to the answers it has already received. The adversary may make a single call to the challenge oracle, passing two messages of his choice. The challenge oracle encrypts one of the two messages (determined by the bit b) and returns the ciphertext to the adversary. The adversary examines the returned ciphertext and attempts to determine which of the two messages was encrypted. If there does not exist any efficient adversary that can tell which message was encrypted (with better than negligible advantage), then the scheme is considered IND-CPA secure. Formally, the pairs of oracle

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lecture 6: Overview of Public-Key Cryptography and RSA

In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first introduce the background of public-key cryptography. Then we will study the model of public-key cryptosystem, and the requirement to design a practical public-key algorithm. Finally, we will study the design of RSA algorithm. The concept of public-key (asymmet...

متن کامل

Lecture 9: Message Authentication Code

In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...

متن کامل

Lecture 10: Message Authentication Code

In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...

متن کامل

How to Use My 1989 Lecture Notes on Encryption, Signatures and Crypto-protocols

This document is written to complement my 1989 lecture notes on Encryption, Signatures and Cryptographic Protocols. In it I sketch what I believe should be done when trying to use these notes as part of a course on Foundations of Cryptography. In addition, I also indicate what I believe should be done in order to augment the material so that it can t into a comprehensive book on Foundations of ...

متن کامل

CS 5431 – Computer Security Practicum Spring 2017 Lecture 5 : Key Management

So far, you have seen an overview of the basic cryptographic protocols that are used to secure a variety of modern systems. In 5430, you talked about symmetric encryption (e.g., AES), asymmetric encryption (e.g., RSA, El Gamal), hybrid encryption, MACs, digital signatures, and key agreement protocols. This means you are now familiar with many of the essential cryptographic building blocks that ...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010