Introduction to the Problem Flashcards
cryptosystem
5-tuple (P,C,K,E,D)
P: possible plaintexts
C: possible cipher texts
K: possible keys
E: encryption function (unique for each key)
D: decryption function
cipher text only attack
given y_1,…,y_i
deduce k, algorithm that outputs x_i+1 or x_1,…,x_i
known plaintext attack
given x_1, y_1, …, x_i, y_i
deduce k or algorithm for x_i+1
chosen plaintext attack
given x_1, y_1, … , x_i, y_i where attacker has chosen x
deduce k or algorithm
chosen cipher text attack
given y_1, x_1, … , y_i, x_i
deduce k
computationally secure
best algorithm for breaking it requires greater computational effort than the resources of the assumed attacker
unconditionally secure
an attacker with infinite computational resources cannot break the system
one-time pad
vernam cipher where the key stream is randomly chosen and never used again
confidentiality
keeping information secret to those not authorised
data integrity
ensuring information has not been altered by those not authorised
authentication
confirmation of the identity
message authentication
confirmation of the source of information
signature
way of binding information to an entity
certification
endorsement of information by trusted source
non-repudiation
preventing an entity from denying previous actions