Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

2. Block Cipher Given a two-key triple encryption for block cipher. Let F be a block cipher with n-bit block def length and key length,

image text in transcribed

2. Block Cipher Given a two-key triple encryption for block cipher. Let F be a block cipher with n-bit block def length and key length, and set Fx1,k(x) Fky (Fk?! (Fk (x)). (a) Assume that given a pair (m, m2) it is possible to find in constant time all keys k2 such that m2 = F2 (m). Show how to recover the entire key for F' (with high probability) in time roughly 2" using three known input/output pairs. (b) In general, it will not be possible to find k2 as above in constant time. However, show that by using a pre-processing step taking 21 time it is possible, given m2, to find in (essentially) constant time all keys k2 such that m2 = F (on). (c) Assume ki is known and that the pre-processing step above has already been run. Show how to use the value y = FX1,52 (2) for a single chosen plaintext x to determine ka in constant time. (d) Put the above components together to devise an attack that recovers the entire key of F by running in roughly 2n time and requesting the encryption of roughly 2n chosen inputs. 2. Block Cipher Given a two-key triple encryption for block cipher. Let F be a block cipher with n-bit block def length and key length, and set Fx1,k(x) Fky (Fk?! (Fk (x)). (a) Assume that given a pair (m, m2) it is possible to find in constant time all keys k2 such that m2 = F2 (m). Show how to recover the entire key for F' (with high probability) in time roughly 2" using three known input/output pairs. (b) In general, it will not be possible to find k2 as above in constant time. However, show that by using a pre-processing step taking 21 time it is possible, given m2, to find in (essentially) constant time all keys k2 such that m2 = F (on). (c) Assume ki is known and that the pre-processing step above has already been run. Show how to use the value y = FX1,52 (2) for a single chosen plaintext x to determine ka in constant time. (d) Put the above components together to devise an attack that recovers the entire key of F by running in roughly 2n time and requesting the encryption of roughly 2n chosen inputs

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Manga Guide To Databases

Authors: Mana Takahashi, Shoko Azuma, Co Ltd Trend

1st Edition

1593271905, 978-1593271909

More Books

Students also viewed these Databases questions

Question

Was there an effort to involve the appropriate people?

Answered: 1 week ago

Question

18. If you have power, then people will dislike and fear you.

Answered: 1 week ago