Let F be a pseudorandom function and G be a pseudorandom generator with expansion factor p(n)...
Fantastic news! We've Found the answer you've been seeking!
Question:
![Let F be a pseudorandom function and G be a pseudorandom generator with expansion factor p(n) = n + 1.](https://dsd5zvtm8ll6.cloudfront.net/questions/2023/12/658c091435ec4_1703766139354.jpg)
Transcribed Image Text:
Let F be a pseudorandom function and G be a pseudorandom generator with expansion factor p(n) = n +1. Suppose the shared key is a uniform k = {0,1}¹. (a) Consider an encryption scheme as follows. To encrypt m = {0,1}2n, parse m as m₁||m2 with |m₁| = |m₂|, then choose uniform r = {0,1}", and send Enck (m) (r,m₁ Fk (r), m2 Fk (r + 1)). Is this scheme CPA-secure? = (b) Consider an encryption scheme as follows. Given as inputs a message m = {0,1}¹/2² and a key k = {0,1}", algorithm Enc chooses a random string r of length n/2, i.e., r t [0,1]¹/2 and computes c := Fk (r||m). Show how to decrypt. Is this scheme CPA-secure? Is this scheme CCA-secure? Explain your answer. (c) Suppose a message (m₁, m2,..., .,m) is encrypted to give a ciphertext (co, C₁, C2, ...,c₁), in the CBC (Ci- pher Block Chaining) and CTR (Counter) modes of operation of a block cipher. Suppose that in transmis- sion a single block of ciphertext c; is dropped for some i € {0, 1,...,1l} (for e.g., the transmitted ciphertext (co, C₁, C₂, ..., c₁) is received as (co, c2, ..., c₁)). Describe the effect of this error in both the CBC and CTR modes of operation. In particular, specify which message blocks are affected, and which are unchanged when a receiver decrypts the modified ciphertext. Let F be a pseudorandom function and G be a pseudorandom generator with expansion factor p(n) = n +1. Suppose the shared key is a uniform k = {0,1}¹. (a) Consider an encryption scheme as follows. To encrypt m = {0,1}2n, parse m as m₁||m2 with |m₁| = |m₂|, then choose uniform r = {0,1}", and send Enck (m) (r,m₁ Fk (r), m2 Fk (r + 1)). Is this scheme CPA-secure? = (b) Consider an encryption scheme as follows. Given as inputs a message m = {0,1}¹/2² and a key k = {0,1}", algorithm Enc chooses a random string r of length n/2, i.e., r t [0,1]¹/2 and computes c := Fk (r||m). Show how to decrypt. Is this scheme CPA-secure? Is this scheme CCA-secure? Explain your answer. (c) Suppose a message (m₁, m2,..., .,m) is encrypted to give a ciphertext (co, C₁, C2, ...,c₁), in the CBC (Ci- pher Block Chaining) and CTR (Counter) modes of operation of a block cipher. Suppose that in transmis- sion a single block of ciphertext c; is dropped for some i € {0, 1,...,1l} (for e.g., the transmitted ciphertext (co, C₁, C₂, ..., c₁) is received as (co, c2, ..., c₁)). Describe the effect of this error in both the CBC and CTR modes of operation. In particular, specify which message blocks are affected, and which are unchanged when a receiver decrypts the modified ciphertext.
Expert Answer:
Answer rating: 100% (QA)
a The given encryption scheme is not CPAsecure An adversary can distinguish between two encryptions ... View the full answer
Related Book For
Algebra Graduate Texts In Mathematics 73
ISBN: 9780387905181
8th Edition
Authors: Thomas W. Hungerford
Posted Date:
Students also viewed these programming questions
-
Defines risk and return. Explains risk and return in the context of a portfolio and distinguishes between individual security and portfolio risk. Distinguish between avoidable (unsystematic) risk and...
-
Shadee Corporation expects to sell 510 sun shades in May and 420 in June. Each shade sells for $146. Shadee's beginning and ending finished goods inventories for May are 80 and 55 shades,...
-
Write a C++ program that calculates GPA of n students, n and students grades are entered by the user: Ask the user to enter the number of students (n), do not accept negative values. For each...
-
6. Kindly describe the accounting framework. What are the elements and how do they effect the financial statements? 7. What does the accounting model specify? What are the elements involved?
-
The light bulbs used to provide exterior lighting for a large office building have an average lifetime of 700 hours. If the distribution of the variable x = length of bulb life can be modeled as a...
-
A 5-m steel beam is lowered by means of two cables unwinding at the same speed from overhead cranes. As the beam approaches the ground, the crane operators apply brakes to slow the unwinding motion....
-
11. Why is it important to control changes made to project documents? How can you achieve effective control?
-
Kenan Mortgage Company has two service departments (human resources and accounting) and two production departments (commercial lending and consumer lending) that relate to its mortgage writing and...
-
Chapman Company obtains 100 percent of Abernethy Companys stock on January 1, 2020. As of that date, Abernethy has the following trial balance: Debit Credit Accounts payable $ 59,500 Accounts...
-
What characterizes someone who views shopping as a form of entertainment (Tables 1B through 7B)? Which factors contribute most? How do your findings relate to the information presented in Consumer...
-
Find the approximations T, M, and S,, for n = 6 and 12. Then compute the corresponding errors ET, EM, and Es. (Round your answers to six decimal places. You may wish to use the sum command on a...
-
A farmer has an acre of specialty vegetables and is preparing for the summer harvest. Historically, this acre has yielded an average of 2,100 lbs of product with a standard deviation of 950 lbs. A...
-
Solve 3x 82+22 = (4).
-
(c) Compute EVPI and EVSI (in thousands of dollars). (Round your answers to one decimal place.) EVPI $ 3.6 EVSI $ 3.6 Xthousand x thousand Discuss whether the firm should consider a consulting expert...
-
Question 9 (1 point) If the common law requires employees of a bar establishment to monitor a potentially intoxicated patron and to possibly make an effort to intervene if there is an indication the...
-
B. A velocity potential is given by the equation: Q = x-y 3. (10 pts) Short answer, What special characteristics of the velocity potential make it very useful in identifying a type of flow and...
-
For the Love of Beans For the Love of Beans is a wholesaler of soy milk. Their most popular product is the Fresh and Cold Satin Soy Vanilla product that they source from an organic supplier. They...
-
a. What is the cost of borrowing if Amarjit borrows $28 500 and repays it over a four-year period? b. How many shares of each stock would he get if he used the $28 500 and invested equally in all...
-
S n is solvable for n 4, but S 3 and S 4 are not nilpotent.
-
Proof that If char K = p 0 and u K but a K p , then x -pn - a K[x] is irreducible for every n > 1.
-
(a) If F is a field and : F Fa (ring) homomorphism, then = 0 or is a monomorphism. If 0, then (1 F ) = 1 F , (b) The set Aut F of all field automorphisms F F forms a group under the operation...
-
Inferentially, is there a significant relationship between the two variables? What tells you this?
-
List the influential observations, according to Cooks distance and the F criterion. Next, subset the Baseball data set so that we are working with batters who have at least 100 at bats. Use this data...
-
List the outliers. What do all these outliers have in common? For Orlando Palmeiro, explain why he is an outlier.
![Mobile App Logo](https://dsd5zvtm8ll6.cloudfront.net/includes/images/mobile/finalLogo.png)
Study smarter with the SolutionInn App