next up previous
Next: Define security by characterizing Up: A Whirlwind Tour of Previous: Mathematical activities

Mathematical activities (continued)


Formal analysis of protocols


Theories of security

information theory
use limitations on what they could know
complexity theory
make the discovery of the plaintext require solution to a hard computational problem.
quantum physics theory
require the attacker to violate laws of physics.



Kevin McCurley
1/23/1998