3 - Defining security Flashcards

1
Q

Considerations when designing a secure algorithm (in relation to the hackers)

A
  • What does the attacker know?
  • What does it mean to break the system? Finding key, plaintext etc
  • How much computing power does the attacker have?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computational Security

(If something is computationally secure then it is…)

A

Unfeasible to break the cipher
- Depends on the currently available algorithms and computing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unconditional security

A

Impossible to break the cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Possible mathematical definition of computational security

A

Provable security
- There is no efficient algorithm that can be used to succeed with reasonably high probability.
… Reasonably high might mean 1/(polynomial in n)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

polynomial time is efficient and exponential is…

A

Inefficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NP hard problem

A

No polynomial time algorithm exists and strongly believed to not exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a known NP-complete problem reduces to breaking the cipher then

A

It is not expected that an efficient algorithm exists for breaking the cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unconditional security: potential precise definition.

(Explained in terms of ciphertext c and plaintext m)

A

Perfect secrecy/information-theoretic security

  • Cipher text only attack
  • Attacker has unlimited power

If, for ciphertext c, the probability that plaintext is m = the probability of plaintext being m without knowing c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly