Show that given encryption system is perfectly secure for m

Assignment Help Computer Network Security
Reference no: EM131225724

Instructions

Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below.

Problem 1. We consider the alphabet A= {0,1,2,3,4} and the space of messages consists of all 1-symbol words, so it is M ={0,1,2,3,4}. The encryption is done using the shift cipher, so it is given by the equation X = x+k (mod 5) applied to each letter of the plaintext (as discussed in class, x is the letter that we encrypt, k is the secret key, and X is the encrypted letter).

a. Suppose Eve knows that the symbols 0 and 1 have the same probability Prob(M=0)=Prob(M=1) = a, and the symbols 2,3, and 4 have the same probability Prob(M=2) = Prob(M=3) = Prob(M=4) = b, and she also knows that 0 is 2 times more likely than 2, so she knows that a = 2b. Find a and b. (Hint: use the fact that the sum of all probabilities is 1).

b. Calculate Prob (M= 2 | C = 4) (according to Eve's distribution). Recall that C= EK(M), that is the ciphertext is obtained by encrypting the message M (which is drawn according to Eve's distribution which you found at point a.), and the key is equally likely to be any number in the set {0,1,2,3,4}. You'll have to use the formula for conditional probability (see the notes, and the proof of Shannon's theorem).

c. Show that the given encryption system is perfectly secure for M, by checking the definition given in class for perfect security - version 1 (Note: As we did in the proof of the perfect security for one-time pad, you need to consider an arbitrary distribution on M, because the definition must hold for all possible distributions).

Problem 2. The alphabet is the same as in Problem 1, but now the space of messages consists of all 2-symbol words, so it is M1 ={(0,0),(0,1), ...(4,3),(4,4)}. Eve knows that the individual symbols 0, 1,2,3,4 have the same probabilities as in Problem 1, and that the two symbols in a word are independent. The encryption is again the shift cipher (recall that this means that the 2-symbol word
(x1, x2) is encrypted as the 2-symbol word (x1+k, x2+k), where k is the key and addition is modulo 5.)

a. Calculate Prob(M=(1,4)). (Hint: This is very simple, just use that the two symbols are independent).

b. Calculate Prob(M=(1, 4) | C = (2, 0)). (Hint: You'll use of course the formula for conditional probability. For the numerator, take into account that the key has to be 1. For the denominator, you need to look at all combinations (message, key) that can produce the ciphertext (2,0). Again use as a model, the proof of Shannon's theorem given in the notes, but adapt to this situation).

c. Using the formal definition of perfect security, explain what the results from (a) and (b) say about whether the shift cipher is perfectly secure for this M1.

Reference no: EM131225724

Questions Cloud

Assignment-physician reimbursement : Directions: With the increasing cost of health care, MCOs have been under tremendous pressure to control health care costs, including physician reimbursement. In this assignment, you are to look at some of the issues that are involved in physician..
Process of improving customer service : Discuss the process of improving customer service in order to ensure consistent excellent customer service.
Key areas of expected improvement such as reduced lead times : Benefits of implementing or improving MRP in an organization (list at least 15 key areas of expected improvement, such as reduced lead times). Five selected items from your list of 15 expected improvements, along with descriptions about how a compani..
Focus on interest-not position : Explain the ideal that we should "focus on interest, not position" can you think of an example in which you successfully negotiated with someone else using this principle?
Show that given encryption system is perfectly secure for m : Calculate Prob (M= 2 | C = 4) (according to Eve's distribution). Show that the given encryption system is perfectly secure for M, by checking the definition given in class for perfect security - version 1.
How do we as patients measure excellence : What does excellence in health care look like? How do we as patients measure excellence? How do health care professionals measure excellence?
Choice of an organization structure : How is the choice of an organization's structure related to the environment in which it operates?
Had the subordination clause not been signed : Had the subordination clause not been signed, both Wells Fargo and the competitor bank receive 85.7% of their claim amount, which is $4.287 Million and $3.913 Million. In this case Wells Fargo would be worse off, while the competitor is relatively..
Beach air potential legal liability for passenger injuries : Beach Air Corp is a scheduled air carrier serving the southeastern US, Bahamas and Caribbean islands with regional turboprop aircraft. One morning, two Beach Air flights are boarding passengers on the regional airline ramp at Orlando, FL. One flight ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

  Create and describe a comprehensive security policy

Present the rationale for the logical and physical topographical layout of the planned network. Create and describe a comprehensive security policy for this data-collection and analysis company.

  What are some ideas you have about possible research topics

Considering your Program (DM/DCS) your concentration, and your interests, what are some ideas you have about possible research topics? Please add in these yourself

  How use of such control may affect democracy and society

How the use of such control may affect democracy and society. For this Discussion, you will view and react to Pariser's TED Talk online.

  Find a sample phishing email

Use Google to find a sample phishing email which there are many of on the Internet

  Write the net neutrality paper

Having read the "Transcending Net Neutrality: Ten Steps Toward an Open Internet" and "SOPA and PIPA What Went Wrong" papers, write the Net Neutrality paper.

  Designate an appropriate class type for this attack

Designate an appropriate class type for this attack. Annotate your rules with comments describing what each component of the rule does, so other security specialists in your team can see how your rules are written.

  A virus is a program that attaches itself to other programs

A virus is a program that attaches itself to other programs. An infected user must take some sort of action to spread a virus to others. A worm functions as an independent program

  Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data acc..

  Why is network security particularly difficult to achieve

Why is network security particularly difficult to achieve?

  Current state of the art of an emerging knowledge domain

MN502: Network Security Assignment. The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging kn..

  How many ways can a selection of 6 coloured balls be made

At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need - In how many different ways can a selection of 6 coloured balls be made from a barrel containing red..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd