Computational Security
Perfect Secrecy vs. Computational Security
Perfect secrecy emphasizes that no plaintext information is leaked, although eavesdroppers have unlimited computational power.
Computational security allows a scheme to leak information with tiny probability to eavesdroppers with bounded computing resources/running time.
Complexity Theory
Complexity theory provides a methodology for analyzing the computational complexity of different cryptographic techniques and algorithms.
Concrete Security
-indistinguishability:
- Security may fail with probability
- Restrict attention to attackers running in time , or CPU cycles.
If is -indistinguishable for all attackers running in time at most , then
-indistinguishability = perfect indistinguishability
Limitation
- Sensitive to exact computational model
- Precise concrete guarantees are difficult to provide
- One must be careful in interpreting concrete-security claims
Asymptotic Security
Introduce security parameter .
And is the probabilistic polynomial time (PPT) in .
is a negligible function in .
Computational Indistinguishability
- Security may fail with probability negligible in
- Restrict attention to attackers running in time polynomial in
Comparison
Concrete Security: A scheme is -secure if for any adversary running for time at most succeeds in breaking the scheme with probability at most
Asymptotic Security: A scheme is secure if any PPT adversary succeeds in breaking the scheme with probability at most negligible.
Another Definition of Encryption
A private-key encryption scheme is defined by three PPT algorithms (, , ):
- takes as input , and outputs (assume )
- takes as input a key and message , and outputs ciphertext
- takes key and ciphertext as input, and outputs a message or error.