Question: Suppose Alice and Bob share keys k1 and k2 for an n-bit block cipher Enc. Consider a setting where Alice wants to authenticate an encrypted

Suppose Alice and Bob share keys k1 and k2 for an n-bit block cipher Enc. Consider a setting where Alice wants to authenticate an encrypted message to Bob as follows: Alice chooses a random n-bit IV , sets c1 = Enck1 (m ⊕ IV ) and c2 = Enck2 (m ⊕ IV ), and then sends (IV, c1, c2) to Bob. When Bob receives (IV, c1, c2) he computes m = Deck1 (c1)⊕IV and m0 = Deck2 (c2)⊕IV . If m0 6= m then Bob outputs ⊥, else he accepts the message m as an authenticated message from Alice. Does this scheme satisfy the security of an authenticated encryption scheme (namely, existential MAC forgery under a chosen message attack)?

Step by Step Solution

3.39 Rating (174 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

To determine whether this scheme satisfies the security of an authenticated encryption scheme lets analyze the protocol step by step considering the requirements for existential MAC Message Authentica... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (2 attachments)

PDF file Icon

60618495a87c9_55238.pdf

180 KBs PDF File

Word file Icon

60618495a87c9_55238.docx

120 KBs Word File

Students Have Also Explored These Related Databases Questions!