Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

24. Suppose Bob and Alice want to flip a coin over a network. Alice proposes the following protocol. (i) Alice randomly selects a value X

24. Suppose Bob and Alice want to flip a coin over a network. Alice proposes the following protocol.

(i) Alice randomly selects a value X e {0,1}.

(ii) Alice generates a 256-bit random symmetric key K.

(iii) Using the AES cipher, Alice computes Y = E(X,R,K), where R consists of 255 randomly selected bits.

(iv) Alice sends Y to Bob.

(v) Bob guesses a value Z {0,1} and tells Alice.

(vi) Alice gives the key K to Bob who computes (X, R) = D(Y, K).

(vii) If X = Z then Bob wins, otherwise Alice wins.

This protocol is insecure.

a. Explain how Alice can cheat.

b. Using a cryptographic hash function h, modify this protocol so that Alice cannot cheat.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Internals A Deep Dive Into How Distributed Data Systems Work

Authors: Alex Petrov

1st Edition

1492040347, 978-1492040347

More Books

Students also viewed these Databases questions

Question

3. Write a policy statement to address these issues.

Answered: 1 week ago