Question: You have a software for an asymmetric encryption scheme AE = ( K , E , D ) AE = ( K , E ,

You have a software for an asymmetric encryption scheme AE=(K,E,D)AE =(K, E, D)AE=(K,E,D) that is known to be IND-CCA secure under some reasonable assumptions. However, the message space for this scheme is limited to messages up to 1MB in length. At some point, you needed to encrypt messages larger than 1MB but less than 2MB. To address this, you decide to use the existing software as follows:
To encrypt a message MMM, split it into equal parts M1M_1M1 and M2M_2M2(for simplicity, assume all messages have even lengths). The ciphertext is computed as:
E(pk1,M1)E(pk2,M2)E(pk_1, M_1)\parallel E(pk_2, M_2)E(pk1,M1)E(pk2,M2)
for any public key pkpkpk, where \parallel denotes concatenation.
The decryption algorithm decrypts both halves of the ciphertext:
M1D(sk1,C1),M2D(sk2,C2)M_1\gets D(sk_1, C_1),\quad M_2\gets D(sk_2, C_2)M1D(sk1,C1),M2D(sk2,C2)
and returns M1M2M_1\parallel M_2M1M2 if neither decryption rejects. If either decryption rejects, the output is rejection. Lets call this modified scheme AE=(K,E,D)AE'=(K, E', D')AE=(K,E,D).
Question:
Do you think AEAE'AE is IND-CPA? IND-CCA? Justify your answers.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!