Overview#

Computational Hardness Assumption implies the Confidentiality of the message is Computationally Secure which implies assuming that any attacker is computationally limited.

Computational Hardness Assumption does not account for Side-channel attacks or other forms of Information Leakage attacks.

In cryptography, a major goal is to create Cryptographic Primitives with provable security.

In some cases, cryptographic protocols are found to be Information-theoretic Secure; the one-time pad is a common example. However, Information-theoretic Secure cannot always be achieved; in such cases, cryptographers fall back to Computational Hardness Assumption.

Roughly speaking, this means that these systems are secure assuming that any adversaries are computationally limited, as all adversaries are in practice. Because hardness of a problem is difficult to prove, in practice certain problems are "assumed" to be difficult.[1]

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-4) was last changed on 28-Jun-2017 09:40 by jim