O'Reilly logo

Modern Cryptography: Theory and Practice by Wenbo Mao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions

9.1 Introduction

We have seen from several examples that the basic public-key cryptographic functions introduced in the preceding chapter in general do not hide partial information about plaintext messages very well, especially when a plaintext message is not random. However, these basic cryptographic primitive functions are not bad at all if they are used in an ideal world in which plaintext messages are random. In such a situation, each of these basic functions is actually very strong.

In this chapter we shall study the bit security of the basic public-key cryptographic functions. We shall see that each of the basic and popular public-key cryptographic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required