Homework 2 Statistics Minimum Value Maximum Value Range
- Slides: 34
Homework 2 Statistics Minimum Value Maximum Value Range Average Median 70. 00 99. 00 29. 00 86. 41 87. 00 Standard Deviation 7. 29 Variance 53. 20 1
Midterm Exam • Date: Tuesday, October 16 th • Time: 3 PM-4: 15 PM (in class) • Location: Lawson B 134 (right here) • Closed Book/No Calculator Note: Our TA (Duc Le) will proctor the midterm Content: Includes today’s lecture (chapters 1 -7) Preparation: • You may prepare one 3 x 5 inch index card (double sides). • Take the practice final • Review homework solutions, book, lecture notes etc. 2
Final Exam (Tentative) • Date: Tuesday, December 11 th (Subject to Change*) • Time: 8 AM (Subject to Change*) • Location: LWSN B 151 (Subject to Change*) * Purdue will not reimburse you for flight re-booking fees 3
Cryptography CS 555 Week 8: • One-Way Functions (Part 2) Fall 2018 4
Recap Corollary: If one-way functions exist then PRGs, PRFs and strong PRPs all exist. Corollary: If one-way functions exist then there exist CCAsecure encryption schemes and secure MACs. We saw how to build PRGs from One-Way. Permutations… 5
n-bits PRFs from PRGs n-bits G(x): = G 0(x) || G 1(x) • 0 0 G 0(k)) … 0 1 k Fk(011)=G 1(G 0(k))) G 0(k) G 1(k) 1 0 … G 1(k)) G 0(G 1(k)) G 1(G 0(k)) 1 1 1 … 0 … 1 … … 0 1 … 6
PRFs from PRGs • 7
PRFs from PRGs • 8
PRFs from PRGs • 9
Hybrid H 0 (Real Construction) n-bits G(x): = G 0(x) || G 1(x) 0 0 G 0(k)) … 0 1 k Fk(011)=G 1(G 0(k))) G 0(k) G 1(k) 1 0 … G 1(k)) G 0(G 1(k)) G 1(G 0(k)) 1 1 1 … 0 … 1 … … 0 1 … 10
Hybrid H 1 (Real Construction) n-bits G(x): = G 0(x) || G 1(x) 0 0 G 0(k)) … 0 r 0 k … 1 0 G 1(k)) G 0(G 1(k)) G 1(G 0(k)) 0 Fk(011)=G 1(r 0)) r 1 1 1 … 0 … 1 … … 0 1 … 11
Hybrid H 2 n-bits G(x): = G 0(x) || G 1(x) 0 … 0 r r 0 0 r 00 1 r 1 1 0 … 1 0 r 11 r 10 r 01 1 … Fk(011)=G 1(r 01) 1 … 0 … 1 … … 0 1 … 12 12
Hybrid Hn (truly random function!) n-bits G(x): = G 0(x) || G 1(x) 0 r 000 0 r r 0 0 r 00 1 r 1 1 0 r 010 1 0 r 11 r 10 r 01 1 r 001 Fk(011)=r 011 1 r 011 0 r 100 1 r 101 r 110 0 1 r 111 13 13
Hybrid H 1 vs H 2 • 14
Hybrid H 2 vs H 1 n-bits G(r 0) vs. r 00 ||r 01 n-bits G(x): = G 0(x) || G 1(x) 0 … 0 r r 0 0 r 00 Irrelevant: (Unexplored) 1 r 1 1 0 … x 1 0 r 11 r 10 r 01 1 … … x 2 xt 0 … 1 … … 0 1 … 15 15
Triangle Inequality • 16
From OWFs (Recap) • 17
From OWFs (Recap) Corollary: If one-way functions exist then PRGs, PRFs and strong PRPs all exist. Corollary: If one-way functions exist then there exist CCAsecure encryption schemes and secure MACs. 18
Are OWFs Necessary for Private Key Crypto • Previous results show that OWFs are sufficient. • Can we build Private Key Crypto from weaker assumptions? • Short Answer: No, OWFs are also necessary for most private-key crypto primitives 19
PRGs OWFs • 20
PRGs OWFs • 21
PRGs OWFs • 22
PRGs OWFs • 23
PRGs OWFs • 24
What other assumptions imply OWFs? • PRGs OWFs • (Easy Extension) PRFs PRGs OWFs • Does secure crypto scheme imply OWFs? • CCA-secure? (Strongest) • CPA-Secure? (Weaker) • EAV-secure? (Weakest) • As long as the plaintext is longer than the secret key • Perfect Secrecy? X (Guarantee is information theoretic) 25
EAV-Secure Crypto OWFs Proposition 7. 29: If there exists a EAV-secure private-key encryption scheme that encrypts messages twice as long as its key, then a one-way function exists. Recap: EAV-secure. • Attacker picks two plaintexts m 0, m 1 and is given c=Enc. K(mb) for random bit b. • Attacker attempts to guess b. • No ability to request additional encryptions (chosen-plaintext attacks) • In fact, no ability to observe any additional encryptions 26
EAV-Secure Crypto OWFs • 27
EAV-Secure Crypto OWFs • 28
MACs OWFs In particular, given a MAC that satisfies MAC security (Definition 4. 2) against an attacker who sees an arbitrary (polynomial) number of message/tag pairs. Conclusions: OWFs are necessary and sufficient for all (non-trivial) private key cryptography. OWFs are a minimal assumption for private-key crypto. Public Key Crypto/Hashing? • OWFs are known to be necessary • Not known (or believed) to be sufficient. 29
Computational Indistinguishability • 30
Computational Indistinguishability • 31
Computational Indistinguishability 32
Computational Indistinguishability 33
Practice Problems 34
- Critical numbers
- Nilai maksimum dan minimum
- Minimum maximum value
- Maximum value
- Min max word problems
- Quadratic function maximum
- Optimization problems maximum and minimum
- Which is not the output signal of the bus controller 8288
- Quadratic model
- Maximum and minimum derivative
- Extreme value theorem
- Relative vs absolute max and min
- Quadratic function examples with answers
- Hole basis and shaft basis system
- Clearance fit tolerance
- Minimum enthalpy and maximum entropy
- Bellani-six thermometer.
- Partial order
- Maximum likelihood vs maximum parsimony
- Maximum likelihood vs maximum parsimony
- Bluetooth consortium
- Maximum unambiguous range
- Jack prelutsky homework oh homework
- Homework oh homework i hate you you stink
- Jack prelutsky homework oh homework
- Homework oh homework i hate you you stink
- Homework oh homework i hate you you stink
- Literal language example
- Introduction to statistics what is statistics
- Variance for grouped data formula
- As compared to long-range forecasts, short-range forecasts
- Konsep expected value
- Maximum value of a function
- Trigonometric function properties
- Poisson ratio for concrete