L10: Cryptography: PRFs, INDCPA
Materials
Use the raw slides (pdf) before lecture to take notes.
Summary
- Review: Security against computationally bounded adversaries (run in polynomial time)
- Review: success of the adversary must be small (how small?)
- Is IND enough ?
- INDCPA game allows an adversary to ask for encryptions of any messages they want.
- Why is this more secure?
- Problems with symmetric key encryption
- Introducing the public key model
- IND-CPA for PKC (slightly different than IND-CPA for symmetric, why?)
- How to build PKC encryption
- Basic number theory
- Euler’s totient function
- Textbook RSA (is insecure, why?)
- OAEP, Examples
- Introducing the age-old problem of authenticity