Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please do the second bullet Questions Let G (0,1) - 10, 1)n be the pseudo random generator defined by G(zi,..,n x1,T1,T2,#2, . . . ,

Please do the second bullet

image text in transcribed

Questions Let G (0,1)" - 10, 1)n be the pseudo random generator defined by G(zi,..,n x1,T1,T2,#2, . . . , xn , xn Compute G(k) for k 11000. 1 pt Encrypt the message m = 0011100110 with the stream cipher defined by G and the pr evious k. 1 pt . What is P, (Gi(k) -0) for i 2n (Gi(r) is the bit number i of the bit string Let A be the the statistical test that returns 0 if G2(k)-G3(k) and 1 otherwise. What Let A be the the statistical test that returns 0 if G2(k)-Gi(k) and 1 otherwise. What G(x). Does this prove that this is a secure PRG? 1pt is the advantage of A? lpt] is the advantage of A? lpt An adversary want s to prove that the stream cipher defined by G is not semantically secure. In the semantic security game, they choose mo0101010101 and mi- 1111111111. In experiment 0, the adversary receives always encryptions of mo (under a random key), while in experiment 1, the adversary always receives an encryption of mi The adversary outputs 0 ifci c and 1 otherwise, where ci,cis the ciphertext Find the probability of Wo Find the probability of W What is the advantage of the adversary? 1 pt The adversary returns 0 in Experiment 0). 1 pt The adversary returns 0 in Exp eriment 1) 1 pt

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions