% crypto reading notes
E(k, m) -> c; D(k, c) -> m.
four types (variants):
M!
); (TODO: check this)
m xor k[i] => c; (k[i]: i’th permutation)
c xor [?-i] => m.perfect security: Pr[E(k, m1) == c] == Pr[E(k, m2) == c]
TODO: why substitution otp, while looks more complex, is not perfect secure? (see example 2.6)
theorem 2.3: what is predicate
? (seems like probability word… ok, it’s
defined right above this def)