Weel 3: Advantage and CPA, CCA1, CCA2 Flashcards
Define “Advantage” in Information Security.
Adv(A) = |Pr(b’= b) - ½ |
What are the Advantage cases?
- A wins > 50% Adv(a) =| p - ½ | for p > ½ therefore Adv(A) > 0 BAD
- A wins < 50% Adv(a) =| p - ½ | for p < ½ therefore Adv(A) > 0 BAD
- A wins = 50% of time Adv(a) = 0 (no advantage) GOOD
If key length is 3 bits what is key space?
2^3 = 8
Given size of key k, what is the probability that the adversary guesses the key correctly?
1 / ( 2^k )
What is a polynomially bounded adversary?
An adversary that can make n guesses where n is polynomially related to keyspace k.
When is e(k) negligible?
When 1/e(k) < |1/poly(k)|
Define a “IND-EAV secure” crypto system?
A cryptosystem is indistinguishable under eavesdropping (IND-EAV secure) if no PPT-bounded adversary has a real (non-negligible) advantage of winning the EAV game.
What are the steps of a Chosen Plaintext Attack (CPA) Game?
- B generates key
- A sends polynomially many query messages q to B
- B encrypts q and sends back to A
- A sends challenge message m0 and m1 to B
- B randomly chooses message, encrypts and sends to A
- A guesses which message was encrypted
What is the difference between Deterministic and Non-deterministic encryption?
Deterministic - two identical messages encrypted with same key result in identical ciphertexts
Non-deterministic - two identical messages encrypted with same key result in different ciphertexts
How are Non-Deterministic encryption ciphertexts decrypted?
Random value used in encryption is made irrelevant.
What are the steps for the Non-Adaptive Chosen Ciphertext Attack (CCA1) Game?
CPA game + Adversary can make decryption queries until the challenge ciphertext is issued
Rules
- B will not decrypt challenge messages m0 and m1
- B will only decrypt valid ciphertext
What are the steps for the Adaptive Chosen Ciphertext Attack (CCA2) Game?
CPA game + adversary can make decryption queries before and after the challenge ciphertext is issued
Rules
- B will not decrypt challenge messages m0 and m1
- B will only decrypt valid ciphertext