Question: Suppose you have a secure block cipher that will be used to encrypt a text file. Alice plans to take each word in the text
Suppose you have a secure block cipher that will be used to encrypt a text file. Alice plans to take each word in the text document and encrypt it independently using the block cipher. The same key is used each time. Then she will concatenate the ciphertexts from each word and send the concatenation to Bob. State every way you can think of that things can go wrong. Could you crack this? How? Under what assumptions (CTO, KPA, CPA, etc).
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
