{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Class-5-12-RC-10

Class-5-12-RC-10 - Random Cryptographic Systems Random...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Random Cryptographic Systems Random Cryptographic Systems ASSUMPTIONS ABOUT CRYPTOGRAPHIC TRANSACTIONS and we also have Example Plaintext space Octopus Cod Oyster Tuna Ciphertext space us Analysis of the “ciphertext only” Attack Theorem 1 H(K| C) = H(K) + H(M) - H(C) Proof The key is independent of the message Thus H(K,C) = H(K,M) H(K,C) = H(K) + H(M) Recall that Thus H(C) + H(K| C) = H(K) + H(M) Q.E.D. C = E (M) Analysis of the “known plaintext ” Attack Theorem 2 H(K| C,M ) = H(K) - H(C|M ) Proof C = E K(M) H(K,C,M) = H(C,M) + H(K| C,M ) H(K,M) = H(C,M) + H(K| C,M ) H(C,M) + H(K| C,M ) = H(K) + H(M) H(K,C, M) = H(K,M) H(K,M) = H(K) + H(M) H(C,M) = H(M) + H(C| M) gives H(M) + H(C| M) + H(K| C,M ) = H(K) + H(M) Q.E.D. ...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online