Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 4 . Attacks on CBC . a . In class we discussed the ECBC ( encrypted CBC ) MAC for messages in x L

Problem 4. Attacks on CBC.
a. In class we discussed the ECBC (encrypted CBC) MAC for messages in xL where x=
{0,1}n. Recall that RawCBC is the same as ECBC, but without the very last encryption
step. We showed that RawCBC is an insecure MAC for variable length messages. Here we
show a more devastating attack on RawCBC. Let m1 and m2 be two multi-block messages.
Show that by asking the signer for the MAC tag on m1 and for the MAC tag on one additional
multi-block message m2' of the same length as m2, the attacker can obtain the MAC tag on
m=m1||m2, the concatenation of m1 and m2.
b. Let's see a real-world attack on CBC encryption with a predictable IV. Suppose Bob uses
AES-CBC encryption with key k to encrypt blocks on disk, where each block is 4096 bytes
long (4KB), the default block size for Linux. Disk block number i is CBC encrypted with
key k and using an IV equal to the binary representation of i. This ensures that if two blocks
on disk hold the same data, they result in different ciphertexts. Note that there is no need to
store the IV with the ciphertext because the IV is derived from the block number. Moreover,
if a single file spans multiple disk blocks, then each disk block is AES-CBC encrypted on its
own. All disk blocks are encrypted using the same secret key k.
Suppose an authoritarian regime publishes a subversive video m and Bob stores m encrypted
on his disk. Later, Bob's machine is seized and the authoritarian regime wants to test if Bob's
disk contains an encrypted copy of m(if so, Bob may have some explaining to do). If this
were possible, it would be a serious violation of semantic security.
Show that the regime can create a multi-block video m for which it is easy to test if the
encrypted m is stored on Bob's disk. You do not know the block number where m will be
stored on Bob's disk. However, you may assume that m is block-aligned, that is, the first byteof m is stored as the first byte of some block on disk, byte number 4097 of m is the first byte
of the next consecutive block, etc. If m is stored on Bob's disk then your test should always
say "yes". For simplicity, you may assume that all other content stored on Bob's encrypted
disk is random bytes.
Hint: Try to design a message m that when encrypted as described above results in a sequence
of encrypted disk blocks, each 4096 bytes long, where some two consecutive encrypted blocks
begin with the same sequence of 16 bytes. It may help to first answer the question assuming
the first encrypted block of the message m is stored in block number i, where i is an (unknown)
even number. Then generalize your answer to an arbitrary (unknown)i.
Note: in practice, disk encryption systems that use AES-CBC, set the IV for block i to be
AES(k',i), where k' is an independent secret key. This prevents your attack.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

What are optimizer hints and how are they used?

Answered: 1 week ago

Question

a. What do R2 and R measure? b. How do R2 and R differ?

Answered: 1 week ago

Question

Write short notes on Interviews.

Answered: 1 week ago

Question

Define induction and what are its objectives ?

Answered: 1 week ago