Semantic Security

Semantic Security

In cryptography, a cryptosystem is semantically secure if any probabilistic, polynomial-time algorithm (PPTA) that is given the ciphertext of a certain message (taken from any distribution of messages), and the message's length, cannot determine any partial information on the message with probability non-negligibly higher than all other PPTA's that only have access to the message length (and not the ciphertext). In other words, knowledge of the ciphertext (and length) of some unknown message does not reveal any additional information on the message that can be feasibly extracted. This concept is the computational complexity analogue to Shannon's concept of perfect secrecy. Perfect secrecy means that the ciphertext reveals no information at all about the plaintext, whereas semantic security implies that any information revealed cannot be feasibly extracted.

Read more about Semantic Security:  History, Private-key Cryptography, Public-key Cryptography

Other articles related to "semantic security, security":

Paillier Cryptosystem - Algorithm - Semantic Security
... The original cryptosystem as shown above does provide semantic security against chosen-plaintext attacks (IND-CPA) ... does not enjoy the highest echelon of semantic security that protects against adaptive chosen-ciphertext attacks (IND-CCA2) ...
Deterministic Encryption
... Under sufficiently strong security guarantees the attacks proposed above become infeasible, as the adversary will be unable to correlate any two encryptions of the same message, or ... This guarantee is known as semantic security or indistinguishability, and has several definitions depending on the assumed capabilities of the attacker (see semantic security) ... scheme is going to be used, it is important to understand what is the maximum level of security that can be guaranteed ...
Semantic Security - Public-key Cryptography
... Semantic security considers only the case of a "passive" attacker, i.e ... Unlike other security definitions, semantic security does not consider the case of chosen ciphertext attack (CCA), where an attacker is able to request the decryption of chosen ciphertexts ... Consequently, semantic security is now considered an insufficient condition for securing a general-purpose encryption scheme ...

Famous quotes containing the words security and/or semantic:

    Of course we will continue to work for cheaper electricity in the homes and on the farms of America; for better and cheaper transportation; for low interest rates; for sounder home financing; for better banking; for the regulation of security issues; for reciprocal trade among nations and for the wiping out of slums. And my friends, for all of these we have only begun to fight.
    Franklin D. Roosevelt (1882–1945)

    Watt’s need of semantic succour was at times so great that he would set to trying names on things, and on himself, almost as a woman hats.
    Samuel Beckett (1906–1989)