Question: Suppose Alice and Bob share keys k1 and k2 for an n-bit block cipher Enc. Consider a setting where Alice wants to authenticate an encrypted
Suppose Alice and Bob share keys k1 and k2 for an n-bit block cipher Enc. Consider a setting where Alice wants to authenticate an encrypted message to Bob as follows: Alice chooses a random n-bit IV , sets c1 = Enck1 (m ⊕ IV ) and c2 = Enck2 (m ⊕ IV ), and then sends (IV, c1, c2) to Bob. When Bob receives (IV, c1, c2) he computes m = Deck1 (c1)⊕IV and m0 = Deck2 (c2)⊕IV . If m0 6= m then Bob outputs ⊥, else he accepts the message m as an authenticated message from Alice. Does this scheme satisfy the security of an authenticated encryption scheme (namely, existential MAC forgery under a chosen message attack)?
Step by Step Solution
3.39 Rating (174 Votes )
There are 3 Steps involved in it
To determine whether this scheme satisfies the security of an authenticated encryption scheme lets analyze the protocol step by step considering the requirements for existential MAC Message Authentica... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (2 attachments)
60618495a87c9_55238.pdf
180 KBs PDF File
60618495a87c9_55238.docx
120 KBs Word File
