Let F: {0, 1}* {0, 1} {0, 1} be a blockcipher. Define E: {0, 1} {0,...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Let F: {0, 1}* {0, 1}" {0, 1}" be a blockcipher. Define E: {0, 1} {0, 1}" {0, 1}" as EK3 || K2 || K1(X) = EK3(EK2(EK1(X))). Prove that if F is a secure PRP, then so is E. To get you started, here's a reminder of how to approach this proof. Given an adversary A that attacks the PRP-security of E, build an adversary B that attacks the PRP-security of F. (Be mindful of the sets from which the keys are sampled in the PRP-experiment for F and E.) Carefully show that the PRP-advantage of B upperbounds the PRP-advantage of A, by analyzing the probabilility that B "wins" its experiment. When building your adversary B, try to make it as simple as possible, and as parsimonious as possible with respect to its resources. Finally, try to write a nice theorem statement to encapsulate your result. Something like this: Theorem 2 Fix integers n, k> 0 and Let F: {0, 1}* {0, 1}" {0, 1}" be a blockcipher. Define E: {0, 1} {0,1}" {0,1}" as EK3 || K2 || K1(X) = EK3(EK2(EK1(X))). Let A be a PRP- adversary (for attacking E) that has time complexity t and asks at most q oracle queries. Then there exists an adversary B, explicitly given in th proof of this theorem, such that Adv (A) [???] Adv (B) + [???] and where B has time complexity t' = [???] and asks q' = [???] queries. You should be able to fill in the missing values as a result of your analysis. Let F: {0, 1}* {0, 1}" {0, 1}" be a blockcipher. Define E: {0, 1} {0, 1}" {0, 1}" as EK3 || K2 || K1(X) = EK3(EK2(EK1(X))). Prove that if F is a secure PRP, then so is E. To get you started, here's a reminder of how to approach this proof. Given an adversary A that attacks the PRP-security of E, build an adversary B that attacks the PRP-security of F. (Be mindful of the sets from which the keys are sampled in the PRP-experiment for F and E.) Carefully show that the PRP-advantage of B upperbounds the PRP-advantage of A, by analyzing the probabilility that B "wins" its experiment. When building your adversary B, try to make it as simple as possible, and as parsimonious as possible with respect to its resources. Finally, try to write a nice theorem statement to encapsulate your result. Something like this: Theorem 2 Fix integers n, k> 0 and Let F: {0, 1}* {0, 1}" {0, 1}" be a blockcipher. Define E: {0, 1} {0,1}" {0,1}" as EK3 || K2 || K1(X) = EK3(EK2(EK1(X))). Let A be a PRP- adversary (for attacking E) that has time complexity t and asks at most q oracle queries. Then there exists an adversary B, explicitly given in th proof of this theorem, such that Adv (A) [???] Adv (B) + [???] and where B has time complexity t' = [???] and asks q' = [???] queries. You should be able to fill in the missing values as a result of your analysis.
Expert Answer:
Related Book For
Posted Date:
Students also viewed these algorithms questions
-
answer the question clearly You are building a flight-control system for which a convincing safety case must be made. Would you assign the tasks of safety requirements engineering, test case...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Consider sending a large file from a host to another over a TCP connection that has no loss. a. Suppose TCP uses AIMD for its congestion control without slow start. Assuming cwnd increases by I MSS...
-
Rapid Scooters plans to sell a motorized standard scooter for $65 and a motorized chrome scooter for $75. Rapid Scooters purchases the standard scooter for $50 and the chrome scooter for $55. Rapid...
-
Velocity near a moving sphere, a sphere of radius R is falling in creeping flow with a terminal velocity v through a quiescent fluid of viscosity/. At what horizontal distance from the sphere does...
-
What is the difference between the design of a simple costing system and an activity-based costing (ABC) system?
-
Matilda is downloading music and videos from an online site. She is currently buying three music downloads that cost $3 each and two video downloads that also cost $3 each. The table below indicates...
-
A 20N force acts perpendicular to the door 0.8m wide at its edge. Find moment at hinges. Also find moment at hinges if 20N force acts at 60 with the plane of door. i) 20N force acting perpendicular...
-
Electro-Phi Inc. (the "Company") is a utility provider that sells electricity to the public. The Company produces the electricity using various forms of power generation, including the burning of...
-
. Fiscal and monetary policies are intended to solve problems of unemployment and inflation that arise due to economic instability. (a) What fiscal policy options must the government implement in...
-
What is the reactor volume & area for acid nitric production by ostwald process? please state the answer with reference.
-
A box of Mr. Phipps Tater Crisps is supposed to contain 156 grams of potato chips. On the side of the box it says "This package is sold by weight, not by volume. Packed as full as practicable by...
-
Convert 57EC to decimal notation. 16 10
-
The company to use is DISNEY. Use Morningstar or Marketwatch , enter the desired stock symbol to get to DISNEY (DIS) front page. Find P/E ratio is listed on the company's page or calculate it....
-
An investor owns a vacant land. Three property developers have approached the landowner with at view of purchasing the land. The first developer wants to build apartments, while the second shopping...
-
Determine Ig. lG Is in the circuit shown. What is the Boc? RC 390 N Rg E Voc + 8 V Ppc 125 27 kN VBB 3 V
-
Identify the most stable compound:
-
Suppose that {ak} and {bk} are real sequences such that ak 0 as k , Prove that k=1 akbk converges. 1ak +1-akl < oo, and !
-
Prove that each of the following sequences converges to zero. a) xn = sin(log n + n5 + en2)/n b) xn = 2n/(n2 + ) c) xn = (2n + l)/(n + 2) d) xn = n/2n
-
Suppose that f is differentiable at 2 and 4 with f(2) = 2, f(4) = 3. f'(2) = , and f'(4) = e. a) If g(x) = xf(x2), find the value of g'(2). b) If g(x) = f2(x), find the value of g'(4). c) If g(x) =...
-
Every financial advisor has a strategy for predicting the direction of the stock market. Most focus on fundamental economic data, such as interest rates and corporate profits. But an alternative...
-
State whether the prediction (or implied prediction) should be trusted in each of the following cases, and explain why or why not. a. Youve found a best-fit line for a correlation between the number...
-
Figure 20 shows data and best-fit lines for both mens and womens world record times in the 1-mile race. Based on these data, predict when the womens world record will be faster than the mens world...
Study smarter with the SolutionInn App