Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Let F be a secure block cipher and consider instantiating Enc - then - MAC with: our favorite CPA - secure encryption Enc ( k

Let F be a secure block cipher and consider instantiating Enc-then-MAC with: our favorite CPA-secure encryption Enc(k,m)=(r,F(k,r)m).- CBC-MAC restricted to 2-block inputs (construction 10.5) The encryption scheme is CPA-secure and the MAC is also a secure MAC since it is used on inputs of only 2 blocks (ciphertexts of the encryption scheme). Because of this Enc-then-MAC will result in a CCA-secure scheme. Show that the result is not CCA-secure when the same key (and same F ) is used for both the encryption \& MAC!

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Internals A Deep Dive Into How Distributed Data Systems Work

Authors: Alex Petrov

1st Edition

1492040347, 978-1492040347

More Books

Students also viewed these Databases questions

Question

7. Determine what feedback is provided to employees.

Answered: 1 week ago