Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 1. (100 points.) Define the family of functions F: {0,1}256 {0, 1)256 {0,1256 by Algorithm FK || K (1||22): Return AES-(K1,2122)||AES(K2, 12) for all

image text in transcribed
Problem 1. (100 points.) Define the family of functions F: {0,1}256 {0, 1)256 {0,1256 by Algorithm FK || K (1||22): Return AES-(K1,2122)||AES(K2, 12) for all K1, K2,11,12 {0,1}128 Here'l denotes string concatenation, 'e' denotes bit-wise exclusive-or, and I denotes the bit-wise complement of a string r. Let TAES denote the time for one computation of AES or AES-1 Below, running times are worst case and should be func- tions of Taes. For full credit avoid use of asymptotics. (Part A - 15 points.) Prove that F is a blockcipher according to the definition given in class. (Part B - 15 points.) What is the running-time of a 2-query exhaustive key search adversary against F? (Part C - 40 points.) Give the most efficient 2-query consistent key recovery adversary that you can with advantage 1 against F. Your answer should consist of the pseudocode for your pro- posed adversary followed by an analysis of its advantage (proving that it is 1) and resource usage (running-time and number of queries). For full credit, your adversary should be significantly faster than exhaustive key search. Exhaustive key search gets no points. (Part D - 30 points.) Would you expect your adversary in Part C to recover the target key (rather than merely a consistent key)? Why or why not? The right yeso answer with missing or completely incorrect justification gets no points. Problem 1. (100 points.) Define the family of functions F: {0,1}256 {0, 1)256 {0,1256 by Algorithm FK || K (1||22): Return AES-(K1,2122)||AES(K2, 12) for all K1, K2,11,12 {0,1}128 Here'l denotes string concatenation, 'e' denotes bit-wise exclusive-or, and I denotes the bit-wise complement of a string r. Let TAES denote the time for one computation of AES or AES-1 Below, running times are worst case and should be func- tions of Taes. For full credit avoid use of asymptotics. (Part A - 15 points.) Prove that F is a blockcipher according to the definition given in class. (Part B - 15 points.) What is the running-time of a 2-query exhaustive key search adversary against F? (Part C - 40 points.) Give the most efficient 2-query consistent key recovery adversary that you can with advantage 1 against F. Your answer should consist of the pseudocode for your pro- posed adversary followed by an analysis of its advantage (proving that it is 1) and resource usage (running-time and number of queries). For full credit, your adversary should be significantly faster than exhaustive key search. Exhaustive key search gets no points. (Part D - 30 points.) Would you expect your adversary in Part C to recover the target key (rather than merely a consistent key)? Why or why not? The right yeso answer with missing or completely incorrect justification gets no points

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Mysql Examples Explanations Explain Examples

Authors: Harry Baker ,Ray Yao

1st Edition

B0CQK9RN2J, 979-8872176237

More Books

Students also viewed these Databases questions