Two approaches to discussing security of a cryptosystem
Computational security
cannot be broken with “available resources” current or future.
- best known method of breaking system takes unreasonably large amount of time
- can reduce the security of the cryptosystem to some well-studied problem that is thought to be difficult.
Unconditional security
cannot be broken, even with infinite computational resources.