Let Π = (Gen,Enc,Dec) be a private-key encryption scheme that has indistinguishable en- cryptions in the presence of an eavesdropper. Which of the following encryption schemes are also necessarily secure against an eavesdropper? If you think a scheme is secure, sketch a proof, if not, provide a counterexample.
Here, for a bit string s, parity(s) is 1 if the number of 1’s in s is odd, and 0 otherwise. The || symbol stands for concatenation. So, for strings if x = 00 and y = 11, x||y = 0011.
(a) Enc1k(m) = 0||Enck(m)
(b) Enc2k(m) = Enck(m)||parity(m)
(c) Enc3k(m) = Enck(m)||Enck(m)
(d) Enc4k(m) = Enck(m)||Enck(m + 1). Here think of m as an integer.
Please type answer note write by hend.
Trending nowThis is a popular solution!
Step by stepSolved in 4 steps
- A B C D 0 1 N 13 111 0 P Q 14 15 16 17 F5 E 4 D 3 S U225 E R F G H I 19 V 6 7 8 T U 18 19 20 21 22 23 24 25 1932 J K L M 10 11 12 W ✗ Y Ꮓ (Show your work.) Decrypt the ciphertext "tyvq" using Affine Cipher in English alphabet with a = 7; b =22 encryption functions is f(p) = ☐ A) hens (7p+22) mod 26 B) hect C) zine D) heloarrow_forward1. Please apply columnar transposition cipher to encrypt the message "a digital computer is a machine that can solve problems for" ignoring the space in between. If the probable word is "network", please give the corresponding ciphertext (no spaces). State the result: Provide Proof: Solution: Proof is as the following, N (3) E(1) T(6) W(7) O(4) R(5) K(2)arrow_forwardRSA cryptosystem Let p = 29 and q = 31. Then the RSA modulus n = pq = 899. We set the length of plaintext blocks to be 2 and the length of ciphertext blocks 3. Let the encryption exponent b = 29. If, for example, we want to encrypt the word live, we first divide the word into blocks of length 2, li and ve, and then find its corresponding number blocks 11 8 and 21 4. We consider these number blocks as numbers in base 26. Then we find the corresponding integers in base 10, that is 11 8 = 11 × 26 + 8 = 294 and 21 4 = 21 × 26 + 4 = 550. The integers 294 and 550 are regarded as modular numbers in Z899 and encrypted as 29429 (mod 899) = 91 and 5502⁹ (mod 899) = 492. Now write 91 and 492 in base 26 of length 3 we get 91 = 0 x 26² +3 x 26 +13 and 492 = 0 x 262 +18 × 26 +24 and the corresponding number blocks of length 3 are 0 3 13 and 0 18 24. Hen the ciphertext for live is ADNASY as 0 3 13 = ADN and 0 18 24 = ASY.arrow_forward
- Encrypt the animal name marmot using the letter to number correspondence abc de f 8hijk 1 mnopar stuvw x y 2 e 1 2 3 4 5 6 7 8 9 18 11 12 13 14 15 16 17 18 19 28 21 22 23 24 25 and the encryption function e :n + (n +1) mod 26 The answer will be a nonsense word (no numbers).arrow_forwardUse symmetric ciphers to encrypt message "“promise" and decrypt message "FOG". The representation of characters in modulo 26 is described as follows: Plaintext - a bcdefg|hijk1 mnopar stuvwx y z Ciphertext A BCD|EFG|HIJKL|M|NO|P|Q|R s T|U|VwxY|Z Value 00 01 02|03 04 05 06|07|08|09|10|11 12|13|14|15 16|17 18|19 20 21 22 23 24 25 The mathematical equations for encryption and decryption can be described as follows: Encryption Ea:i→i+kmod 26 Decryption Da : i→i-k mod 26 i represents the messages (plaintext or cipher), k represents a symmetric key. In this case k=20arrow_forwardNow assume that the user used only 34 characters from the keyboard. What is the key length in bits in this case? Provide the correct answer for the fourth question. This is not a graded assignment.arrow_forward
- Messages are to be encoded using the RSA method, and the primes chosen are p “ 17 and q “ 19, so that n “ pq “ 323, and e “ 19. Thus, the public key is p323, 19q. (a) Show that the decryption exponent d (your private key) is 91.arrow_forwardAlice and Bob use the ElGamal scheme with a common prime q=131 and a primitive root a=6. Let Bob's public key be Yn= 3. A. What is the ciphertext of M=9 if Alice chooses the random integer k=4? B. If Alice uses the same k to encrypt two messages M₁ and M₂ as (12, 65) and (12, 64), what is the relation between M₁ and M₂?arrow_forwardDesign a cryptographic solution for implementing the dinning cryptographers protocol. You should consider the following: The secret messages shared between any two agents in the protocol are communicated over public channels only. The announcements made by each agent must be traceable in a trustworthy way to that agent. Your solution should be a new protocol that addresses the above two requirements.arrow_forward
- Consider a very simple symmetric block encryption algorithm in which 32-bits blocks of plaintext are encrypted using a 64-bit key. Encryption is defined as C = (PK₁) K₁ where C = ciphertext, K = secret key, Ko = leftmost 64 bits of K, K₁ = rightmost 64 bits of K,+ = bitwise exclusive OR, and is addition mod 264. a. Show the decryption equation. That is, show the equation for P as a function of C, Ko, and K₁. b. Suppose and adversary has access to two sets of plaintexts and their correspond- ing ciphertexts and wishes to determine K. We have the two equations: C = (PK) K₁; C = (PK) K₁ First, derive an equation in one unknown (e.g., Ko). Is it possible to proceed fur- ther to solve for Ko?arrow_forwardNote: The notation from this problem is from Understanding Cryptography by Paar and Pelzl. We conduct a known-plaintext attack against an LFSR. Through trial and error we have determined that the number of states is m = 4. The plaintext given by 01100101 —D ХоXјX2XҙX4X5X6X7 when encrypted by the LFSR produced the ciphertext 10010100 — Уo У1 У2 Уз Уз У5 У6 Ут- What are the tap bits of the LFSR? Please enter your answer as unspaced binary digits (e.g. 0101 to represent P3 = 0, p2 = 1, Pi = 0, po = 1).arrow_forwardSuppose your RSA public key is PK: {n, e} = {13861, 37}. Your friend sends you a ciphertext C = 9908. But unfortunately you have forgotten your private key, now you have to crack it yourself.a) Write down a possible condition of factors p and q.p= q=b) What is your private key SK: {d}?d=c) What is the plaintext of your friend’s message?The plaintext M =d) Suppose the plaintext M is a 12-digit number consisting of a prefix “19” and 1234567890. What is the corresponding ciphertext? Since M is greater than n, you only need to encrypt four digits at a time. Ignore redundant zeros. e.g., 0001 = 1. The result should contain three integers.The ciphertext C0 =arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education