Basic Cryptographic Definitions Core Security Goals Confidentiality: information is accessible only to authorized parties Integrity: information hasn’t been altered by unauthorized parties Authenticity: information originates from claimed source Non-repudiation: sender cannot deny sending the message Threat Models: Passive adversary: Only observes communications (eavesdropper) Active adversary: Can modify, insert, or delete messages Adaptive adversary: Can change […]