Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It is not CCA secure because an adversary with access to a decryption oracle may get the key that was used to encrypt a challenge ciphertext via the method I’ve described.

In the CCA experiment, the oracle uses the same key as the challenge ciphertext.



But the OTP is still secure against that attack because the “key” is never reused. It is literally just noise, no useful information whatsoever.


It isn’t secure against the attack because the oracle uses the same key.

The oracle is a tool used to formalize our definition. You’re right that the fact that OTP isn’t CCA secure doesn’t matter in practice because the key is only used for one message so such an oracle doesn’t generally exist.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: