Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3.20 For a function g: {0, 1 }n --+ {0, 1}n, let g$() be an oracle that, on input 1n, chooses r +- {0, 1

3.20 For a function g: {0, 1 }n --+ {0, 1}n, let g$() be an oracle that, on input 1n, chooses r +- {0, 1 }n uniformly at random and returns (r, g (r)). We say a keyed function F is a weak pseudorandom function if for all PPT algorithms D, there exists a negligible function negl such that:

| pr [ D^f^s (.) (1^n) =1] - pr [ D^f^s (.) (1^n) =1 ] | <= negl (n),

where k <-- {0, l }^n and f <-- Func n are chosen uniformly at random

(a) Prove that if F is pseudorandom then it is weakly pseudorandom.

(b) Let F' be a pseudorandom function, and define .

Fk (x)=F`k(x)if x is even k . F`k(x+1) if x is odd

Prove that F is weakly pseudorandom, but not pseudorandom.

(c) Is counter-mode encryption instantiated using a weak pseudorandom function F necessarily CPA-secure? Does. it necessarily have indistinguishable encryptions in the presence of an eavesdropper? Prove your answers.

(d) Construct a CPA-secure encryption scheme based on a weak pseudorandom function. Hint: One of the constructions in this chapter will work.

This question from introduction to modern cryptography book chapter 3 question 3.20

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Programming With Visual Basic .NET

Authors: Carsten Thomsen

2nd Edition

1590590325, 978-1590590324

More Books

Students also viewed these Databases questions