Cryptographic Hashes
Cryptographic Hashes
Yan Huang
Credits: David Evans, CS588
Recap: CPA
1. kKeyGen(1n). b{0,1}. Give Enc(k, ?) to A. 2. A chooses as many plaintexts as he wants, and
receives the corresponding ciphertexts via Enc(k, ?). 3. A picks two plaintexts M0 and M1. (Picking plaintexts
for which A previously learned ciphertexts is allowed!) 4. A receives the ciphertext of Mb, and continues to
have accesses to Enc(k, ?). 5. A outputs b'.
A wins if b'=b.
2
Recap: CPA
Challenger.
kK, b{0,1}
for i=1,...,q, CPA query: mi,0 , mi,1 M : |mi,0| = |mi,1|
ci E(k, mi,b)
m0 , m1 M : |m0| = |m1|
c E(k, mb)
Adversary A
m'i,0 , m'i,1 M : |m'i,0| = |m'i,1| c'i E(k, m'i,b)
For all efficient adversary A, | Pr[ b=b' ] - 1/2 | is "negligible".
b' {0,1}
Recap: Message Integrity Game
1. k Gen(1n). 2. A is given polynomial time and an oracle access to
query Mac(k,?). Let ti=Mac(k, mi) and Q={(m1, t1), ..., (mq, tq)}. 3. A outputs (m, t).
A wins the game if Vrfy(m, t)=1 and (m,t) Q.
Recap: Message Integrity
(Gen, Mac, Vrfy) --- a message authentication code scheme.
Chal.
kGen(1n)
m1 M
m2 , ..., mq
t1 Mac(k,m1) t2 , ..., tq
(m,t)
Adversary
A
b b=1 if Vrfy(k,m,t) = 1 and (m,t) { (m1, t1) , ... , (mq, tq) } b=0 otherwise
Def: (Gen, Mac, Vrfy) is a Secure Message Authentication Code if for all "efficient" A:
AdvMac[A ] = Pr[Chal. outputs 1] is "negligible."
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- luis miras ken steele sourceforge
- product specification
- symantec intelligence symantec intelligence report
- 6 8 0 j 6 6
- proceedings of fedsm 02 fedsm2002 31337 fedsm2002 31337
- title read and interpret working drawings and
- cryptographic attacks
- cryptographic hashes
- manuscript print and the english renaissance lyric
- 32 Ë7 67 Ï1 17 5 5 6 26