Here we are investigating various ways of how we can use a CPA- secure scheme to...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Here we are investigating various ways of how we can use a CPA- secure scheme to build authenticated encryption. Assume Enck (m) : r||FK(r) m is a CPA-secure encryption scheme, and let Mack (m) := Fk (m) be a secure MAC and PRF F. Consider the following authenticated encryption proposals. Discuss what are the problem(s) with each technique that prevents it from being a valid authenticated encryption scheme. Mention briefly the idea of the attack. No need for a formal proof, but provide a clear general explanation. a) Scheme 1: The proposed authenticate encryption scheme uses a single key K and con- catenation || to produce Enck (m) = Enck (m) | Mack (m) b) Scheme 2: Let the key be a combined symmetric key K = (KE, KM) which is composed of two separate keys known to both parties, and Enck (m) Encke (m)||MacKM (m) c) Scheme 3: Let the key be a combined symmetric key K = (KE, KM) which is composed of two separate keys known to both parties, and first calculate t = Mack (m) then encrypt Enck (m) Encke (mt) Here we are investigating various ways of how we can use a CPA- secure scheme to build authenticated encryption. Assume Enck (m) : r||FK(r) m is a CPA-secure encryption scheme, and let Mack (m) := Fk (m) be a secure MAC and PRF F. Consider the following authenticated encryption proposals. Discuss what are the problem(s) with each technique that prevents it from being a valid authenticated encryption scheme. Mention briefly the idea of the attack. No need for a formal proof, but provide a clear general explanation. a) Scheme 1: The proposed authenticate encryption scheme uses a single key K and con- catenation || to produce Enck (m) = Enck (m) | Mack (m) b) Scheme 2: Let the key be a combined symmetric key K = (KE, KM) which is composed of two separate keys known to both parties, and Enck (m) Encke (m)||MacKM (m) c) Scheme 3: Let the key be a combined symmetric key K = (KE, KM) which is composed of two separate keys known to both parties, and first calculate t = Mack (m) then encrypt Enck (m) Encke (mt)
Expert Answer:
Answer rating: 100% (QA)
a Scheme 1 The problem with Scheme 1 is that the MAC Mack is computed over the entire ciphertext inc... View the full answer
Related Book For
Cost Management A Strategic Emphasis
ISBN: 978-0078025532
6th edition
Authors: Edward Blocher, David Stout, Paul Juras, Gary Cokins
Posted Date:
Students also viewed these programming questions
-
How does Walmart combat the "Bullwhip" effect in its supply chain?
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
In your own words, define or explain the terms or symbols (a) (b) [ ]; (c) Spectator ion; (d) Weak acid.
-
Finish the proof of Lemma 2.9.
-
R1 1 3 R3 R5 225 5 3 5 7 4 4 R4 224 R2
-
Which of the following amounts would appear only in a multiple-step income statement? a. Income from continuing operations. c. Gross profit on sales. \(b\). Income from discontinued operations. d....
-
Prepare the adjusting journal entries that Del Gato Clinic must record as a result of preparing the bank reconciliation in Exercise 8- 10. In Exercise 8- 10, Del Gato Clinic deposits all cash...
-
Tanner-UNF Corporation acquired as a long-term investment $340 million of 5.0% bonds, dated July 1, on July 1, 2024. Company management has the positive intent and ability to hold the bonds until...
-
Franklin Joiner, director of health, education, and welfare, had just left a meeting with the states newly elected governor and several of the other recently appointed department heads. One of the...
-
The difference equation of a causal discrete time LTI system is given as: y(n) = -1/2y(n-1) + x(n) a) Find frequency response H(e^fw) for the system b) Find output response to the input given as:...
-
What is a transfer function?
-
Identify three rules for writing Problem Statements.
-
Describe the CM process and its various task elements.
-
What is the System Capability Construct?
-
How do you write a Problem Statement?
-
A company kept a record of its hourly cost to produce a particular item as the number of items produced each hour varied. Below is a table of data containing these data. # of Items Produced Each Hour...
-
The following data are supplied for the common stocks of Nikola Corporation, Tesla, Inc. and General Motors: Nikola Corp (NKLA) Tesla Inc. (TSLA) Close Price ($) Close Price ($) 67.53 30.00 40.81...
-
Maxwell's direct labor costs for the month of January follow: Problem Information Direct labor hourly rate paid............................................. 28.5 Total standard direct labor hours for...
-
Data Performance, a computer software consulting company, has three major functional areas: computer programming, information systems consulting, and software training. Carol Bingham, a pricing...
-
One way the value chain can be helpful is to provide a basis for a company to determine the full cost of its product or service over the entire value chain. Often companies tend to focus only on...
-
The financial statements for the Columbia Sportswear Company can be found in Appendix A at the end of this book. You are considering an investment in Columbia Sportswear after a recent outdoor trip...
-
Crescent Paints, Inc., a paint manufacturer, has been in business for five years. The company has had modest profits and has experienced few operating difficulties until this year, 2019, when...
-
Listed below are selected financial data for three corporations: Honeywell International, Inc. (environmental controls), The Dow Chemical Company (chemicals and plastic products), and Abbott...
Study smarter with the SolutionInn App