Probability and Security Definitions
Every security game is a probability experiment.
One number controls everything.
What the numbers actually mean in practice.
| Attack effort | Example | Advantage |
|---|---|---|
| \(2^{56}\) operations | DES crack (1998) | \(2^{-72}\) |
| \(2^{64}\) operations | Feasible on modern hardware | \(2^{-64}\) |
| \(2^{80}\) operations | Well-funded adversary | \(2^{-48}\) |
| \(2^{128}\) operations | Beyond foreseeable classical computers | \(\approx 1\) |
The most useful collision formula in cryptography.
| Domain size \(N\) | 50% collision at \(Q\) | Security bits |
|---|---|---|
| \(2^{64}\) (DES block) | \(2^{32}\) | 32 |
| \(2^{96}\) (GCM nonce) | \(2^{48}\) | 48 |
| \(2^{128}\) (AES block) | \(2^{64}\) | 64 |
| \(2^{256}\) (SHA-256 output) | \(2^{128}\) | 128 |
Reading and composing security statements.
| Notation | Meaning | Used in |
|---|---|---|
| \(\lambda\) | Security parameter (key length in bits) | All lectures |
| Negligible | Shrinks faster than any \(1/\lambda^d\) | Security definitions |
| Super-poly | Grows faster than any \(\lambda^d\) | Key space size |
| \(b\)-bit security | Best attack requires \(\approx 2^b\) operations | Concrete security |
| \(\text{Game}_\text{adv}[\mathcal{A}, S]\) | Advantage of \(\mathcal{A}\) in Game against \(S\) | All security proofs |
| Birthday bound | \(Q\) samples from \(N\): collision \(\approx Q^2/2N\) | PRF/PRP, hashing, nonces |
| Union bound | \(\Pr[A \cup B] \leq \Pr[A] + \Pr[B]\) | Proof technique |
| Reduction | “Break Scheme \(\Rightarrow\) break Primitive” | All security proofs |