Crypto Foundations & Threat Models
- Goals: confidentiality, integrity, authenticity
- Threat models define the attacker before the defense
- Security levels and work factors
- Randomness, entropy, and bias
- Why key/nonce reuse breaks everything
1 / 11
Encryption alone != integrity
No threat model -> no real security claim
Birthday bound dominates collisions
Reuse collapses to XOR of plaintexts
Security is end-to-end