A seminar by Eleanor McMurtry grad student at University of Melbourne on Metauni
Video URL
https://invidious.yoshixi.net/watch?v=zer9563S6zM&listen=false
Notes
- Goal of cryptography is to create systems and prove their security
- Systems in this sense are efficiently computable algorithms
- They also satisfy Correctness
- Theoretical cryptographers try and avoid Symmetric Cryptography because it gets ugly in proofs of Correctness. They usually work with Asymmetric Cryptography
- All asymmetric cryptography will have (with public key , private key , cipher text , message ):
- Generating algorithm
- Encryption algorithm
- Decryption algorithm
- Security can be thought of as computational problems or distinguishing problems
- Computational problems include: Discrete Logarithm Problem
- Distinguishing problems include: Decisional Diffie Hellman Assumption
- With two parties, we model algorithms to be Probabilistic Polynomial Time.
- We have one (Adversary) party
- We have one (Challenger) party
- Indistinguishability derived from Indistinguishability Under Chosen Plaintext Attack
- Crypto systems are considered secure if no adversary can win the game with significantly greater probability than an adversary who guesses randomly
- Textbook RSA is Deterministic Algorithm, meaning the IND-CPA game does not have an even probability. Attackers can brute force easily
- IND-CPA is secure if PPT adversaries, the probability that the adversary wins - is Negligible Function.
- IND-CPA is limited by:
- Composability
- Strength of the security also depends on the game. Some IND-CPA systems are better suited to specific games
- Universal Composability attempts to address these limitations
- A one-time pad like XOR cipher with Quantum Key Exchange, is not universally composable, as, any outside observer not entangled, will be able to see the information passed during quantum key exchange. (Its a Post-Quantum Cryptography issue)
- IND-CCA is a better game that takes into consideration if a party can decrypt their any message other than the target message. Avoids Malleability
- Eleanor believes IND-CCA is too strong, and kind of silly definition
- You can create a System that satisfies IND-CCA, and then create another system Where:
- Note that the only difference here is there is an extra bit at the end
- So, the attacker can just ask for the decryption of the ciphertext, then invert the last bit, and now they have the original message