Question: Consider the Authenticated Encryption Integrated Experiment above. To clarify, in step 3, the first oracle is the encryption oracle while the second oracle is the
Consider the Authenticated Encryption Integrated Experiment above. To clarify, in step 3, the first oracle is the encryption oracle while the second oracle is the decryption oracle. Explain how the adversary A will succeed if A is allowed to query the decryption (second) oracle with a ciphertext c obtained from the encryption (first) oracle.
The authenticated-encryption experiment PrivKA,ae(n) : 1. A key k is generated by running Gen (1n). 2. A uniform bit b{0,1} is chosen. 3. The adversary A is given input 1n and access to two oracles: (a) If b=0, then A is given access to Enck() and Deck(). (b) If b=1, then A is given access to Enck0() and Dec(). A is not allowed to query a ciphertext c to its second oracle that it previously received as the response from its first oracle. 4. The adversary outputs a bit b. 5. The output of the experiment is defined to be 1 if b=b, and 0 otherwise. In the former case, we say that A succeeds
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
