Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part (b) - Break CCA Let F : {0,1} x {0,1} + {0,1} be a secure PRP (key, input and output size are all n

image text in transcribed

Part (b) - Break CCA Let F : {0,1}" x {0,1}" + {0,1}" be a secure PRP (key, input and output size are all n bits). Consider the following encryption scheme: Gen(1"): Output a key k = (ki, k2) which consists of two parts: k1, k2 both of size n bits selected uniformly at random from {0, 1}" Enc((ki, k2), m) : Pick r uniformly at random from {0, 1}" Set a= Fki (r) Set b = Fki (remoka) Return c= 1. Write down the decryption algorithm. 2. Prove that the scheme is NOT CCA secure (design a successful adversary and compute its success probability). Part (b) - Break CCA Let F : {0,1}" x {0,1}" + {0,1}" be a secure PRP (key, input and output size are all n bits). Consider the following encryption scheme: Gen(1"): Output a key k = (ki, k2) which consists of two parts: k1, k2 both of size n bits selected uniformly at random from {0, 1}" Enc((ki, k2), m) : Pick r uniformly at random from {0, 1}" Set a= Fki (r) Set b = Fki (remoka) Return c= 1. Write down the decryption algorithm. 2. Prove that the scheme is NOT CCA secure (design a successful adversary and compute its success probability)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Concepts

Authors: David Kroenke, David Auer, Scott Vandenberg, Robert Yoder

10th Edition

0137916787, 978-0137916788

More Books

Students also viewed these Databases questions