Cs 7880 Graduate Cryptography Lecture 2: Macs, Statistical Distance, Statistical Security
نویسندگان
چکیده
The MAC construction that we saw in the previous lecture was not very practical in the sense that we can improve the construction by using the same key and tag length as before but for a bigger message space. That is, for some prime p we have: • K = Zp × Zp • M = Zp for some d ≥ 1 • T = Zp (We can replace Zp by any finite field F. In particular, it’s useful to use a binary extension field F2` since in that case keys and messages are just bit string of length `.). For a key k = (x, y) and message m = (m1, . . . ,md) we define
منابع مشابه
Lecture 2 : Optimality of One - time MACs and Shannon Impossibility
Today we conclude with our study with one-time message authentication codes. In Lecture 1, we defined one-time secure MACs and constructed these MACs using δ − AXU functions. Furthermore, we showed that the security of this construction lost security exponentially with as the min-entropy of the key decreased. We show that the constructions achieved in Lecture 1 were essentially tight. We will d...
متن کاملLecture 2 : Optimality of One - time MACs and Shannon Impossibility
Today we conclude with our study with one-time message authentication codes. In Lecture 1, we defined one-time secure MACs and constructed these MACs using δ − AXU functions. Furthermore, we showed that the security of this construction lost security exponentially with as the min-entropy of the key decreased. We show that the constructions achieved in Lecture 1 were essentially tight. We will d...
متن کامل2 : Optimality of One - time MACs and Shannon Impossibility
Today we conclude with our study with one-time message authentication codes. In Lecture 1, we defined one-time secure MACs and constructed these MACs using δ − AXU functions. Furthermore, we showed that the security of this construction lost security exponentially with as the min-entropy of the key decreased. We show that the constructions achieved in Lecture 1 were essentially tight. We will d...
متن کاملCS 5431 – Computer Security Practicum Spring 2017 Lecture 5 : Key Management
So far, you have seen an overview of the basic cryptographic protocols that are used to secure a variety of modern systems. In 5430, you talked about symmetric encryption (e.g., AES), asymmetric encryption (e.g., RSA, El Gamal), hybrid encryption, MACs, digital signatures, and key agreement protocols. This means you are now familiar with many of the essential cryptographic building blocks that ...
متن کاملRandomness in Cryptography January 10 , 2013 Lecture 1 : One - Time MACs , ( XOR ) Universal hashing , Weak Keys
In today’s lecture we study one-time message authentication codes (MACs) which are secure in an information-theoretic sense. We will see that, compared to informationtheoretically secure encryption, significantly better parameters can be achieved. We will also study such MACs in the setting of imperfect randomness, i.e. when the secret key is not drawn from the uniform distribution but rather i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015