Analyze concisely and clearly your protocol a and b

Assignment Help Computer Engineering
Reference no: EM131308320

Cryptography Project

Let's suppose that Alice and Bob have each a number n_A and respectively n_B between 1 and 10 and they want to know if they have the same number or not. The problem is that in case they don't have the same number, they don't want to reveal to the other party any other information. They can solve this problem with thefollowing protocol that uses 10 boxes that have a small opening and two pebbles. Each box also can be locked and opened with a key. We assume that Alice has the keys of all boxes.

1. Alice enters alone in the room where the boxes are and she inserts a pebble in the n_A-th box.

2. Bob enters alone in the room where the boxes are and he inserts a pebble in the n_B-th box. He cannot open any of the boxes because the keys are in the other room.

3. Alice enters and opens the n_A-th box. If it has two pebbles, it means that n_A = n_B, and if it has a single pebble, then n_A is not equal to n_B. Alice tells Bob whether n_A and n_B are equal or not.

Note that we assume that Alice is honest and she follows the protocol's rules (otherwise she could open all boxes and see what n_B is).

(A) Your first task is to design a protocol (name it Protocol A) that has the same functionality as the one above, but instead of locked boxes, uses some encryption scheme, and email for communication.

(B) Your second task is to design protocol B using encryption schemes and email communication, in which Alice and Bob need to determine whether n_A + n_B>= t, where t is some threshold number. As before, Alice and Bob will not learn anything else besides that the sum of their numbers is at least T, or not.

In both protocols, you can assume that Alice and Bob are honest, and follow the rules of the protocols designed by you.

Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.

Reference no: EM131308320

Questions Cloud

Will the unit maintain the room design db and wb : A room has design conditions of78 F DB and 50% RH and a RSCL = 18,000 BTUlhr and RLCL = 8000 BTUlhr. An air conditioning unit supplies 900 CFM of air to the room at 58 F DB and 56 F WB. Will the unit maintain the room design DB and WB? What are th..
Assess the information needs of the decision makers : Assess the information needs of the following decision makers.
Performance of pharmaceutical supply chain : Please associate each of the performance measures to at least one of the pharmaceutical risks previously identified in (4), and justify? Summarize your findings on the form of short table(s)
How to use the snippet tool : Write a basic search techniques and the differences between personal and scholarly research, it's time to try out what you've learned.select a topic that you might want to use for a term paper.
Analyze concisely and clearly your protocol a and b : Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.
Calculate the compressive stress between each tire and road : Calculate the compressive stress between each tire and the road. The locations of the vehicle's mass center and the wheelbase dimensions are shown.
How can you learn from your chosen thief to acknowledge : Analyze your findings about one identified thief. How can you learn from your chosen thief to acknowledge and recognize the motives and behavioral indicators that someone might be spying against the company you work for?
Draw the circuit of a free running multivibrator : Draw the circuit of a free running Multivibrator. Assuming Vdd = 15 V and Vss = -15 V, find the value of the resistors so that the trigger threshold is set at 12 V
Calculate the mass of anhydrous sodium carbonate : When titrated, 25ml of this solution requires 20.5ml of 0.5molL-1 sodium hydroxide solution for complete neutralisation. Calculate the mass of anhydrous sodium carbonate added to the hydrochloric acid solution.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Show that red-black bsts are not memory less

Show that red-black BSTs are not memory less - if you insert a key that is smaller than all the keys in the tree and then immediately delete the minimum, you may get a different tree.

  Write down a 2- to 3-page paper which compares and

designing and coding a procedure module or object can be complex and time consuming. once these elements of a computer

  What are some ways that you could help link your

1. what are some ways that you could help link your organizations business metrics to your it department? which

  Question1 define defense in depth and explain the different

question1. define defense in depth and explain the different layers.2. what is leading security principle in

  Why some companies do not pay sufficient

Reasons why some companies do not pay sufficient attention to staff induction

  Write a function that accepts as arguments the following

The function should determine the median of the array. This value should be returned as double. (Assume the values in the array are already sorted).

  Compare the merits of atm and gigabit ethernet technologies

compare the advantages of atm and gigabit ethernet technologies as high-speed networking solutions. describe how to

  Construct a 3-bit counter

Construct a 3-bit counter using three D flip-flops and a selection of logic gates. The inputs should consist of a signal that resets the counter to 0, called reset, and a signal to increment the counter, called inc.

  Prepare a windows application

A national Digital service provider would like you to prepare a Windows application that will display the global growth of smart phones.

  Flowcharts and pseudo-code are two language-independent

flowcharts and pseudo-code are two language-independent ways to capture the programming steps needed to solve a

  Make an asp.net application using visual studio .net 2003

design an ASP.NET application using Visual Studio .NET 2003. Your application should includfe at least one web form and five different types of controls. Feel free to create more than one instance of the same type.

  Explain the key elements of recovering from lost assets

Describe and explain the key elements of recovering from lost assets. o What are Internet connected systems? Describe five examples. How does encryption work? Why is it considered a premier tool in IT Security?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd