Weel 3: Advantage and CPA, CCA1, CCA2 Flashcards

1
Q

Define “Advantage” in Information Security.

A

Adv(A) = |Pr(b’= b) - ½ |

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Advantage cases?

A
  1. A wins > 50% Adv(a) =| p - ½ | for p > ½ therefore Adv(A) > 0 BAD
  2. A wins < 50% Adv(a) =| p - ½ | for p < ½ therefore Adv(A) > 0 BAD
  3. A wins = 50% of time Adv(a) = 0 (no advantage) GOOD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If key length is 3 bits what is key space?

A

2^3 = 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Given size of key k, what is the probability that the adversary guesses the key correctly?

A

1 / ( 2^k )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a polynomially bounded adversary?

A

An adversary that can make n guesses where n is polynomially related to keyspace k.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When is e(k) negligible?

A

When 1/e(k) < |1/poly(k)|

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a “IND-EAV secure” crypto system?

A

A cryptosystem is indistinguishable under eavesdropping (IND-EAV secure) if no PPT-bounded adversary has a real (non-negligible) advantage of winning the EAV game.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the steps of a Chosen Plaintext Attack (CPA) Game?

A
  • B generates key
  • A sends polynomially many query messages q to B
  • B encrypts q and sends back to A
  • A sends challenge message m0 and m1 to B
  • B randomly chooses message, encrypts and sends to A
  • A guesses which message was encrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between Deterministic and Non-deterministic encryption?

A

Deterministic - two identical messages encrypted with same key result in identical ciphertexts

Non-deterministic - two identical messages encrypted with same key result in different ciphertexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are Non-Deterministic encryption ciphertexts decrypted?

A

Random value used in encryption is made irrelevant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps for the Non-Adaptive Chosen Ciphertext Attack (CCA1) Game?

A

CPA game + Adversary can make decryption queries until the challenge ciphertext is issued

Rules

  • B will not decrypt challenge messages m0 and m1
  • B will only decrypt valid ciphertext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the steps for the Adaptive Chosen Ciphertext Attack (CCA2) Game?

A

CPA game + adversary can make decryption queries before and after the challenge ciphertext is issued

Rules

  • B will not decrypt challenge messages m0 and m1
  • B will only decrypt valid ciphertext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly