Abstract
In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined. Thus we shall start by looking at the first rigorous definition for this concept, namely perfect secrecy which, while providing the strongest security assurance, has important practical disadvantages that motivate the introduction of computational security concepts that are more suited for practical use. These notions are defined with the help of complexity theory and the concept of pseudorandomness, a weakening of randomness that takes into account the fact that computational resources are limited. The security notions also make use of the concepts of one-way function and pseudo-random generator, which are of crucial importance for cryptography and are also introduced here.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
The term honest is used here as a synonym of legitimate and is devoid of ethical content.
- 2.
Also called a cryptographically secure (or cryptographically strong) pseudo-random generator.
- 3.
There are also methods to produce uncorrelated bits from correlated bit sources but they are more complicated and we shall not study them here.
- 4.
Here we use Maple’s package Bits available only from version 12 onwards but, with a little further work, this can also be done with previous versions of Maple.
- 5.
See, e.g., http://en.wikipedia.org/wiki/Year_2038_problem for a description of this problem.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Gómez Pardo, J.L. (2013). Private-Key Encryption. In: Introduction to Cryptography with Maple. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32166-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-32166-5_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32165-8
Online ISBN: 978-3-642-32166-5
eBook Packages: Computer ScienceComputer Science (R0)