Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
3 Cards in this Set
- Front
- Back
What happens under Perfect Encryption Hypothesis? |
Cryptograms can only be decrypted under the decryption key Nonces or secret keys cannot be guessed (All regardless of the computational power of the attacker) Different messages = different Cryptogram Different key = different Cryptogram |
|
The Dolev-Yao intruder model? |
Interferes in all communications Knows all "public information (Stores all sent messages) Generate nonces and keys Shuffle and change messages Activate arbitrary participants Worst case scenario |
|
What can a nonce also act as? |
A timestamp |