Asymptotic approach and efficient computation – Encryption and Decryption

4.4.1 Asymptotic approach and efficient computation To account for future advances in computing technology, software or hardware optimized for a specific type of attack, and potential differences in the desired security level (e.g., average internet user versus government agency), modern cryptography uses a so-called asymptotic approach rooted in complexity theory [97]. The asymptotic approach treats…