Theory of cryptography | Cryptography

Ciphertext indistinguishability

Ciphertext indistinguishability is a property of many encryption schemes. Intuitively, if a cryptosystem possesses the property of indistinguishability, then an adversary will be unable to distinguish pairs of ciphertexts based on the message they encrypt. The property of indistinguishability under chosen plaintext attack is considered a basic requirement for most provably secure public key cryptosystems, though some schemes also provide indistinguishability under chosen ciphertext attack and adaptive chosen ciphertext attack. Indistinguishability under chosen plaintext attack is equivalent to the property of semantic security, and many cryptographic proofs use these definitions interchangeably. A cryptosystem is considered secure in terms of indistinguishability if no adversary, given an encryption of a message randomly chosen from a two-element message space determined by the adversary, can identify the message choice with probability significantly better than that of random guessing (1⁄2). If any adversary can succeed in distinguishing the chosen ciphertext with a probability significantly greater than 1⁄2, then this adversary is considered to have an "advantage" in distinguishing the ciphertext, and the scheme is not considered secure in terms of indistinguishability. This definition encompasses the notion that in a secure scheme, the adversary should learn no information from seeing a ciphertext. Therefore, the adversary should be able to do no better than if it guessed randomly. (Wikipedia).

Ciphertext indistinguishability
Video thumbnail

Indistinguishability obfuscation from...to jumping pigs - Nir Bitansky

Indistinguishability obfuscation has turned out to be an outstanding notion with strong implications not only to cryptography, but also other areas such as complexity theory, and differential privacy. Nevertheless, our understanding of how to construct indistinguishability obfuscators is s

From playlist Mathematics

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Perfect Cipher - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Summary - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

One Time Pad - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Gambling, Computational Information, and Encryption Security - Bruce Kapron

Gambling, Computational Information, and Encryption Security Bruce Kapron University of Victoria; Member, School of Mathematics March 24, 2014 We revisit the question, originally posed by Yao (1982), of whether encryption security may be characterized using computational information. Yao p

From playlist Members Seminar

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography I" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This lecture will serve as a "crash course" in modern cryptography for those with no prior exposure

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Indistinguishability Obfuscation from Well-Founded Assumptions - Huijia (Rachel) Lin

Computer Science/Discrete Mathematics Seminar I Topic: Indistinguishability Obfuscation from Well-Founded Assumptions Speaker: Huijia (Rachel) Lin Affiliation: University of Washington Date: November 16, 2020 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Cryptography - Seminar 1 - Foundations

This seminar series is about the mathematical foundations of cryptography. In the first seminar Eleanor McMurtry introduces cryptography and explains some of the problems that need to be solved in order to develop proper foundations. The webpage for this seminar is https://lnor.net/uc-sem

From playlist Metauni

Video thumbnail

Adeline Roux-Langlois : Using structured variants in lattice-based cryptography - Lecture 1

CONFERENCE Recording during the thematic meeting : « Francophone Computer Algebra Days» the March 06, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Jean Petit Find this video and other talks given by worldwide mathematicians on CIRM's Audiov

From playlist Mathematical Aspects of Computer Science

Video thumbnail

Perfect Cipher Is Impractical - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Zero Knowledge Proofs - Seminar 5 - NP languages have zero knowledge proofs

This seminar series is about the mathematical foundations of cryptography. In this series Eleanor McMurtry is explaining Zero Knowledge Proofs (ZKPs). This seminar covers the 1991 proof by Goldreich-Micali-Widgerson that every NP language has a zero knowledge proof. You can join this semi

From playlist Metauni

Video thumbnail

Shannons Theory

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

GRCon21 - Rampart Communications: Cryptographic Modulation: Zero-Attack-Surface Wireless

Presented by Keith Palmisano at GNU Radio Conference 2021 Wireless communication is the fabric of modern connectivity, but no one thinks of wireless as inherently secure. Fundamentally, it’s a means of easily increasing access and mobility, but as much as we want high-speed no-drop 5G/wif

From playlist GRCon 2021

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 2 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Symmetric Cryptosystems - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

CERIAS Security: Secret Handshakes 3/6

Clip 3/6 Speaker: Stanislaw Jarecki · University of California at Irvine Secret Handshake is an authentication protocol with non-standard and strong anonymity property: Namely, the secrecy of the *affiliations* (i.e. the certificates) of party A who engages in this authentication prot

From playlist The CERIAS Security Seminars 2005 (1)

Related pages

Information security | Disk encryption | Encryption | Image noise | Oracle machine | TrueCrypt | Ciphertext | Advantage (cryptography) | Provable security | Malleability (cryptography) | Semantic security | Computational indistinguishability | Cryptosystem | Steganography | Turing machine | Negligible function | Distinguishing attack | Deniable encryption