 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
Cryptography
is always based on algorithms
|
|
|
which
are orders of magnitude easier to
|
|
|
|
compute
in the forward (normal) direction
|
|
|
|
than
in the reverse (attack) direction.
|
|
|
• |
The
attacker’s problem is never harder than
|
|
|
|
trying
all possible keys
|
|
|
• |
The
more material the attacker has the
|
|
|
|
easier
his task
|
|