Professional Documents
Culture Documents
Dk’(Ek(m)) = m
“Hard” ???
Model of Eve (the attacker):
Kerckhoffs’ Principle:
Why?
Secrecy of short key versus big algorithm
Simplicity of changing key versus replacing algorithm
For groups: one alg. w/ many keys vs. many algs.
Eve’s ability:
Ciphertext-only attack
Known-plaintext attack
Chosen-plaintext attack
Chosen-ciphertext attack
Related key attack
Goals of a system designer that wants to use cryptography:
- Confidentiality, Integrity, Authenticity,
Cryptographic Strength
Cryptographic strength: