Video URL
https://invidious.yoshixi.net/watch?v=zer9563S6zM&listen=false
Notes
- Goal of cryptography is to create systems and prove their security
- Systems in this sense are efficiently computable algorithms
- They also satisfy Correctness
- Theoretical cryptographers try and avoid Symmetric Encryption because it gets ugly in proofs of Correctness. They usually work with Asymmetric Cryptography
- All asymmetric cryptography will have (with public key , private key , cipher text , message ):
- Generating algorithm
- Encryption algorithm
- Decryption algorithm
- Security can be thought of as computational problems or distinguishing problems
- Computational problems include: Discrete Logarithm Problem
- Distinguishing problems include: Decisional Diffie Hellman Assumption
- With two parties, we model algorithms to be Probabilistic Polynomial Time.
- We have one (Adversary) party
- We have one (Challenger) party
- Indistinguishability derived from Indistinguishability Under Chosen Plaintext Attack
- Crypto systems are considered secure if no adversary can win the game with significantly greater probability than an adversary who guesses randomly
- Textbook RSA is Deterministic Algorithm, meaning the IND-CPA game does not have an even probability. Attackers can brute force easily
- IND-CPA is secure if PPT adversaries, the probability that the adversary wins - is Negligible Function.
- IND-CPA is limited by:
- Composability
- Strength of the security also depends on the game. Some IND-CPA systems are better suited to specific games
- Universal Composability attempts to address these limitations