Question: Q 1 : Let G: 0 , 1 n 0 , 1 n is a PRG . We define Hkx = Gk x , is
Q: Let G:nn is a PRG We define HkxGkx is Hk a PRF If yes, explain why; if not, give an explicit attack a PPT adversary that violates the definition pts
In practice, it is often the case that good block ciphers such as AES or some carefully designed hashes such as SHA are assumed to be a PRF However, block cipher, by name, works on a fixed length of blocks, eg AES works on bit messages only. The followings are two possible ways to adjust the inputoutput length of a PRF prove that the constructions are still PRF according to the above definition.
Q: Given a PRF E:Ktimes nm we construct F:Ktimes nm as follows:
FKx:EKxEKx
Is FK still a PRF If yes, give a brief proof, if not, give a brief attack showing the violation of PRF definition. pts
Q: Can we construct a PRG from a PRF assuming the PRF output length is larger than the key length or the input length If yes, give the concrete construction and briefly explain; if not, explain why. pts
Symmetric key encryption: Suppose KeyGen Enc, Dec is an INDCPA secure symmetric key encryption. We define the following new encryption algorithms, are the new schemes still INDCPA secure Briefly explain why. If you believe it is insecure, provide an explicit attacker violating the INDCPA definition.
Q: Enckm is defined as follows:
It runs Enckm and obtains c;
It runs Enckm again to obtain c The final ciphertext will be cc pts
Q: Enckm is defined as follows:
It runs Enckm and obtains c;
It runs f on m to obtain c where f is a pseudorandom generator. The final ciphertext will be cc pts
Message Authentication Codes.
Suppose :KeyGen Tag Verify and :KeyGen Tag Verify are two message authentication code schemes.
Q: :KeyGen Tag Verify is defined as follows:
KeyGen first runs KeyGen obtains k and then runs KeyGen obtains k the output key is k k
Tagk km m first runs Tagk m and obtains and it runs Tagk mm and obtains where the message m that Tag works on is a pair of messages m m The final tag is The verification can be defined accordingly.
Is a secure MAC? Briefly explain why. pts
Q: :KeyGen Tag Verify is defined as follows:
KeyGen is identical to KeyGen and it outputs a key k
Tagkm m first runs Tagk m and obtains and it runs Tagk m and obtains The final tag is
sigma
Is a secure MAC? Briefly explain why. pts
Q: Given two constructions of message authentication codes :KeyGen Tag Verify:KeyGen Tag Verify Construct a secure MAC scheme :KeyGen Tag Dec which will be secure unforgeable as long as one of is unforgeable but you dont know which one and briefly explain why. pts
Q: Explain why the following paradigm does not provide secure authenticated encryption, ie an encryption scheme that satisfies both INDCPA security and ciphertext integrity where the adversary cannot create new ciphertexts without knowing the key or asking the encryption oracle The paradigms encryption algorithm initially executes an Enc algorithm on message m to obtain c then runs a Tag algorithm on message m and obtains The final ciphertext will be csigma pts
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
