Week 2b: IND-EAV and Perfect Secrecy Flashcards
1
Q
What functions does an encryption system algorithm contain?
A
- key-gen algorithm
- encryption algorithm
- decryption algorithm
2
Q
What inputs/outputs does a key-gen algorithm take?
A
Input: nothing
Output: key
3
Q
What inputs/outputs does an encryption algorithm take?
A
Input: key, plaintext
Output: ciphertext
4
Q
What inputs/outputs does a decryption algorithm take?
A
Input: key, ciphertext
Output: plaintext
5
Q
What are the steps for the IND-EAV game?
A
- B generates random key
- A sends m0 and m1 to B
- B selects m0 or m1, encrypts the message and sends ciphertext to A
- A guesses which message was encrypted
6
Q
What does IND-EAV stand for?
A
Indistinguishability under eaves dropping.
7
Q
Define “perfect secrecy”.
A
- given a ciphertext c of message m the probability of guessing m is unchanged
- Pr[ M=m | C=c ] = Pr[ M=m ]
8
Q
Explain Shannon’s Perfect Secrecy Theorem.
A
A crypto system has perfect secrecy if
keyspace == ciphertext space == message space
and every key is used with equal probability