Hacker News new | past | comments | ask | show | jobs | submit login

Being a one-time pad makes it irrelevant if you get the key. So it’s CCA secure because you never reuse the pad. You’ve gathered no useful information, ie you’ve only gathered noise that has no use.



It is not CCA secure because an adversary with access to a decryption oracle may get the key that was used to encrypt a challenge ciphertext via the method I’ve described.

In the CCA experiment, the oracle uses the same key as the challenge ciphertext.


But the OTP is still secure against that attack because the “key” is never reused. It is literally just noise, no useful information whatsoever.


It isn’t secure against the attack because the oracle uses the same key.

The oracle is a tool used to formalize our definition. You’re right that the fact that OTP isn’t CCA secure doesn’t matter in practice because the key is only used for one message so such an oracle doesn’t generally exist.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: