Answered step by step
Verified Expert Solution
Question
1 Approved Answer
( 1 0 Points ) The following scheme encrypts a plaintext by simply reordering its bits, according to the secret permutation k : Describe an
Points The following scheme encrypts a plaintext by simply reordering its bits, according
to the secret permutation :
Describe an attack demonstrating that the scheme does not satisfy onetime perfect se
curity.
Points Consider the following variant of onetime perfect security, where Eve can ob
tain two ciphertexts on chosen plaintexts encrypted under the same key, called twotime
perfect security
We say that an encryption scheme is twotime perfectly secure if inM
chosen by Eve, the following distributions are identical:
::Enc:Enc;klarrKeyGen
::Enc:Enc;klarrKeyGen
Describe an attack demonstrating that onetime pad does not satisfy this security definition.
Points Let KeyGen Enc Dec : and KeyGen Enc Dec : be two encryption
schemes such that only one of them satisfies onetime perfect security, but you don't know
which one. Using both and but no other encryption scheme construct an encryption
scheme with onetime perfect security and prove its security.
extra credit, Points Prove that if an encryption scheme has ie there are fewer
possible keys than there are possible messages then it cannot satisfy onetime perfect
security. Try to structure your proof as an explicit attack on the scheme, ie a distinguisher
between the distributions and
Hint: There is no restriction on the running time of the attacker. Exhaustive bruteforce
attacks are therefore valid.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started