Question: Let F be a pseudorandom function and G be a pseudorandom generator with expansion factor p(n) = n +1. Suppose the shared key is

Let F be a pseudorandom function and G be a pseudorandom generator with expansion factor p(n) = n + 1.

Let F be a pseudorandom function and G be a pseudorandom generator with expansion factor p(n) = n +1. Suppose the shared key is a uniform k = {0,1}. (a) Consider an encryption scheme as follows. To encrypt m = {0,1}2n, parse m as m||m2 with |m| = |m|, then choose uniform r = {0,1}", and send Enck (m) (r,m Fk (r), m2 Fk (r + 1)). Is this scheme CPA-secure? = (b) Consider an encryption scheme as follows. Given as inputs a message m = {0,1}/2 and a key k = {0,1}", algorithm Enc chooses a random string r of length n/2, i.e., r t [0,1]/2 and computes c := Fk (r||m). Show how to decrypt. Is this scheme CPA-secure? Is this scheme CCA-secure? Explain your answer. (c) Suppose a message (m, m2,..., .,m) is encrypted to give a ciphertext (co, C, C2, ...,c), in the CBC (Ci- pher Block Chaining) and CTR (Counter) modes of operation of a block cipher. Suppose that in transmis- sion a single block of ciphertext c; is dropped for some i {0, 1,...,1l} (for e.g., the transmitted ciphertext (co, C, C, ..., c) is received as (co, c2, ..., c)). Describe the effect of this error in both the CBC and CTR modes of operation. In particular, specify which message blocks are affected, and which are unchanged when a receiver decrypts the modified ciphertext.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a The given encryption scheme is not CPAsecure An adversary can distinguish between two encryptions ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!