DOC PREVIEW
Princeton COS 433 - Lectures 1-6: Short Recap

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

COS 433: CryptographyPerfectly Secure EncryptionPseudorandom Functions (PRF)Security of PRF-based ConstructionsCPA Secure EncryptionPrinceton University • COS 433 • Cryptography • Fall 2007 • Boaz BarakCOS 433: Cryptography Princeton University Fall 2007Boaz BarakLectures 1-6: Short Recap2Perfectly Secure EncryptionEx0yx1I can’t guess if it was x0 or x1 with prob better than ½ One time pad achieves this for unbounded adversary with |key| ¸ |message|Pseudorandom GeneratorsGI can’t tell if I’m seeing G(s) or just lots of random coins!sy$$$$$$$$$$$$$$We conjecture that they exist. (PRG Axiom)If we’re right, can get encryption with |key| < |message length|3Pseudorandom Functions (PRF)fkxyI don’t know what’s inside this box!Theorem: PRG Axiom ) 9 PRF4Ideal scheme using random functionESecurity of PRF-based ConstructionsEfkEncryption scheme using PRF. Can adversary succeed? 1) Prove that ideal scheme is secure. 2) Show this implies security for real scheme:Otherwise all system is one big adversary for the PRF.5CPA Secure EncryptionEx0yx1EThey gave me encryption box to play with and I still can’t guess if it’s x0 or x1 w/ prob > ½ + ²Theorem: 9 PRF ) 9 CPA-secure encryptionConstruction: Ek(x) = choose r2R {0,1}n send (r,


View Full Document

Princeton COS 433 - Lectures 1-6: Short Recap

Download Lectures 1-6: Short Recap
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lectures 1-6: Short Recap and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lectures 1-6: Short Recap 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?