Question: You have a software for an asymmetric encryption scheme AE = ( K , E , D ) AE = ( K , E ,
You have a software for an asymmetric encryption scheme AEKEDAE K E DAEKED that is known to be INDCCA secure under some reasonable assumptions. However, the message space for this scheme is limited to messages up to MB in length. At some point, you needed to encrypt messages larger than MB but less than MB To address this, you decide to use the existing software as follows:
To encrypt a message MMM split it into equal parts MMM and MMMfor simplicity, assume all messages have even lengths The ciphertext is computed as:
EpkMEpkMEpk Mparallel Epk MEpkMEpkM
for any public key pkpkpk where parallel denotes concatenation.
The decryption algorithm decrypts both halves of the ciphertext:
MDskCMDskCMgets Dsk Cquad Mgets Dsk CMDskCMDskC
and returns MMMparallel MMM if neither decryption rejects. If either decryption rejects, the output is rejection. Lets call this modified scheme AEKEDAEK E DAEKED
Question:
Do you think AEAEAE is INDCPA? INDCCA? Justify your answers.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
