Abstract
The security of many currently used cryptosystems, in particular that of all public-key cryptosystems, is based on the hardness of an underlying computational problem, such as factoring integers or computing discrete logarithms. Security proofs for these systems show that the ability of an adversary to perform a successful attack contradicts the assumed difficulty of the computational problem. Security proofs of this type were presented in Chapter 9. For example, we proved that public-key one-time pads induced by one-way permutations with a hard-core predicate are ciphertext-indistinguishable. The security of the encryption scheme is reduced to the one-way feature of function families, such as the RSA or modular squaring families, and the one-way feature of these families is, in turn, based on the assumed hardness of inverting modular exponentiation or factoring a large integer (see Chapter 6). The security proof is conditional, and there is some risk that in the future, the underlying condition will turn out to be false.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Delfs, H., Knebl, H. (2015). Unconditional Security of Cryptosystems. In: Introduction to Cryptography. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47974-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-662-47974-2_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47973-5
Online ISBN: 978-3-662-47974-2
eBook Packages: Computer ScienceComputer Science (R0)