CSE442T Exam 1 Review
The exam will take place in class on Monday, October 21.
The topics will cover Chapters 1 and 2, as well as the related probability discussions we’ve had (caveats below). Assignments 1 through 3 span this material.
Specifics on material:
NOT “match-making game” in 1.2 (seems fun though)
NOT the proof of Theorem 31.3 (but definitely the result!)
NOT 2.4.3 (again, definitely want to know this result, and we have discussed the idea behind it)
NOT 2.6.5, 2.6.6
NOT 2.12, 2.13
The probability knowledge/techniques I’ve expanded on include conditional probability, independence, law of total probability, Bayes’ Theorem, union bound, 1-p bound (or “useful bound”), collision
I expect you to demonstrate understanding of the key definitions, theorems, and proof techniques. The assignments are designed to reinforce all of these. However, exam questions will be written with the understanding of the time limitations.
The exam is “closed-book,” with no notes of any kind allowed. The advantage of this is that some questions might be very basic. However, I will expect that you will have not just memorized definitions and theorems, but you can also explain their meaning and apply them.
Chapter 1
Prove security
Definition 11.1 Shannon secrecy
(A crypto-system) is said to be private-key encryption scheme that is Shannon-secrete with respect to distribution over the message space if for all and for all ,
(The adversary cannot learn all, part of, any letter of, any function off, or any partial information about the plaintext)
Definition 11.2 Perfect Secrecy
(A crypto-system) is said to be private-key encryption scheme that is perfectly secret if forall :
(For all coding scheme in the crypto system, for any two different message, they are equally likely to be mapped to )
Definition 12.3
A private-key encryption scheme is perfectly secret if and only if it is Shannon secret.
Chapter 2
Efficient Private-key Encryption
Definition 24.7
A triplet of algorithms is called an efficient private-key encryption scheme if the following holds.
- is a p.p.t. such that for every , it samples a key .
- is a p.p.t. that given and produces a ciphertext .
- is a p.p.t. that given a ciphertext and key produces a message .
- For all
One-Way functions
Definition 26.1
A function is worst-case one-way if the function is:
- Easy to compute. There is a p.p.t that computes on all inputs , and
- Hard to invert. There is no adversary such that
Definition 27.2 Negligible function
A function is negligible if for every . there exists some such that for all , .
Definition 27.3 Strong One-Way Function
A function mapping strings to strings is a strong one-way function if it satisfies the following two conditions:
- Easy to compute. There is a p.p.t that computes on all inputs , and
- Hard to invert. There is no adversary such that
Definition 28.4 (Weak One-Way Function)
A function mapping strings to strings is a strong one-way function if it satisfies the following two conditions:
- Easy to compute. There is a p.p.t that computes on all inputs , and
- Hard to invert. There is no adversary such that
Notation for prime numbers
Denote the (finite) set of primes that are smaller than as
Assumption 30.1 (Factoring)
For every adversary , there exists a negligible function such that
(For every product of random 2 primes, the probability for any adversary to find the prime factors is negligible.)
(There is no polynomial function that can decompose the product of two bit prime, the best function is )
Theorem 35.1
For any weak one-way function , there exists a polynomial such that function
from is strong one-way.
RSA
Definition 46.7
A group is a set of elements with a binary operator that satisfies the following properties
- Closure:
- Identity: such that
- Associativity: .
- Inverse: , there is an element such that
Definition Euler totient function .
if is prime
if and are primes
Theorem 47.10
Corollary 48.11
.
Corollary 48.12
Some other important results
Exponent
when is large.
Primes
Let be the lower-bounds for prime less than or equal to .
Theorem 31.3 Chebyshev
For ,
Corollary 31.3
For ,
(The probability that a uniformly sampled n-bit integer is prime is greater than )
Modular Arithmetic
Extended Euclid Algorithm
def eea(a,b)->tuple(int):
# assume a>b
# return x,y such that ax+by=gcd(a,b)=d.
# so y is the modular inverse of b mod a
# so x is the modular inverse of a mod b
# so gcd(a,b)=ax+by
if a%b==0:
return (0,1)
x,y=eea(b,a%b)
return (y,x-y(a//b))