Lecture 5 - EAV-Secrecy and PRG
Lecture 5 - EAV-Secrecy and PRG
CSE-411 Cryptography
Instructor : Dr. Ahmed Gomaa
Fall, 2024
Cryptography
Lecture 5
EAV Secrecy and PRG
Recommended reading: Chapter 3
Encryption and plaintext length
seed
output
PRGs
• We don’t know…
– Would imply P NP
• We will assume certain algorithms are PRGs
– Recall the 3 principles of modern crypto…
– This is what is done in practice
– We will return to this later in the course
• Can construct PRGs from weaker assumptions
– For details, see Chapter 7
Where things stand
p bits
key
p bits p bits
message ciphertext
“Pseudo” one-time pad
n bits
key
p bits
G “pseudo” key
p bits p bits
message ciphertext
Pseudo one-time pad
• Correctness is obvious…
Security of pseudo-OTP?
b
D
For any efficient D, the probabilities that D
outputs 1 in each case must be “close”
Proof by reduction
y
m 0, m 1
mb b←{0,1}
c
b’ A
if (b=b’)
output 1 D
Analysis
y
G
m 0, m 1
mb b←{0,1}
-Enc c
b’ A
if (b=b’)
output 1 D
Thank You