Professional Documents
Culture Documents
http://www.cs.tau.ac.il/∼bchor/crypto07.html
http://www.cs.tau.ac.il/∼bchor
School of Computer Science
Tel-Aviv University
1
Lecture notes 1, revised Jan. 19, 2008
Prerequisites
I Linear Algebra
I Probability
I Algorithms (formerly “efficiency of computations”)
I Computational Models
I “Mathematical Maturity”
Encryption
Notations and Definitions
Let us welcome the two major players in this field, Alice and Bob
(claps!).
Important questions:
I What does the adversary know or seen before?
I What are the adversary’s computational resources?
Adversarial Model: Passive Eavesdropper
Enters our third major player, Eve (claps again!).
I Shift cipher
I Conclusion – large key space required
(this can be formalized in information theoretic terms)
I Substitution cipher
I Large key space, still “easy” to break
Example:
Plaintext: attack at dawn
Ciphertext: waawoq wa vwmk
Pr [plaintext = P | C ] = Pr [plaintext = P]