Week 2b: IND-EAV and Perfect Secrecy Flashcards

1
Q

What functions does an encryption system algorithm contain?

A
  • key-gen algorithm
  • encryption algorithm
  • decryption algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What inputs/outputs does a key-gen algorithm take?

A

Input: nothing
Output: key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What inputs/outputs does an encryption algorithm take?

A

Input: key, plaintext
Output: ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What inputs/outputs does a decryption algorithm take?

A

Input: key, ciphertext
Output: plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the steps for the IND-EAV game?

A
  1. B generates random key
  2. A sends m0 and m1 to B
  3. B selects m0 or m1, encrypts the message and sends ciphertext to A
  4. A guesses which message was encrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does IND-EAV stand for?

A

Indistinguishability under eaves dropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “perfect secrecy”.

A
  • given a ciphertext c of message m the probability of guessing m is unchanged
  • Pr[ M=m | C=c ] = Pr[ M=m ]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Shannon’s Perfect Secrecy Theorem.

A

A crypto system has perfect secrecy if
keyspace == ciphertext space == message space
and every key is used with equal probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly