Lecture 1-Introduction and Encryption Methods
Lecture 1-Introduction and Encryption Methods
• no matter how much computer power or time is available, the cipher cannot be
broken since the ciphertext provides insufficient information to uniquely determine
the corresponding plaintext
• computational security
• given limited computing resources (eg time needed for calculations is greater than
age of universe), the cipher cannot be broken