Analyze concisely and clearly your protocol a and b

Assignment Help Computer Engineering
Reference no: EM131308320

Cryptography Project

Let's suppose that Alice and Bob have each a number n_A and respectively n_B between 1 and 10 and they want to know if they have the same number or not. The problem is that in case they don't have the same number, they don't want to reveal to the other party any other information. They can solve this problem with thefollowing protocol that uses 10 boxes that have a small opening and two pebbles. Each box also can be locked and opened with a key. We assume that Alice has the keys of all boxes.

1. Alice enters alone in the room where the boxes are and she inserts a pebble in the n_A-th box.

2. Bob enters alone in the room where the boxes are and he inserts a pebble in the n_B-th box. He cannot open any of the boxes because the keys are in the other room.

3. Alice enters and opens the n_A-th box. If it has two pebbles, it means that n_A = n_B, and if it has a single pebble, then n_A is not equal to n_B. Alice tells Bob whether n_A and n_B are equal or not.

Note that we assume that Alice is honest and she follows the protocol's rules (otherwise she could open all boxes and see what n_B is).

(A) Your first task is to design a protocol (name it Protocol A) that has the same functionality as the one above, but instead of locked boxes, uses some encryption scheme, and email for communication.

(B) Your second task is to design protocol B using encryption schemes and email communication, in which Alice and Bob need to determine whether n_A + n_B>= t, where t is some threshold number. As before, Alice and Bob will not learn anything else besides that the sum of their numbers is at least T, or not.

In both protocols, you can assume that Alice and Bob are honest, and follow the rules of the protocols designed by you.

Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.

Reference no: EM131308320

Questions Cloud

Will the unit maintain the room design db and wb : A room has design conditions of78 F DB and 50% RH and a RSCL = 18,000 BTUlhr and RLCL = 8000 BTUlhr. An air conditioning unit supplies 900 CFM of air to the room at 58 F DB and 56 F WB. Will the unit maintain the room design DB and WB? What are th..
Assess the information needs of the decision makers : Assess the information needs of the following decision makers.
Performance of pharmaceutical supply chain : Please associate each of the performance measures to at least one of the pharmaceutical risks previously identified in (4), and justify? Summarize your findings on the form of short table(s)
How to use the snippet tool : Write a basic search techniques and the differences between personal and scholarly research, it's time to try out what you've learned.select a topic that you might want to use for a term paper.
Analyze concisely and clearly your protocol a and b : Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.
Calculate the compressive stress between each tire and road : Calculate the compressive stress between each tire and the road. The locations of the vehicle's mass center and the wheelbase dimensions are shown.
How can you learn from your chosen thief to acknowledge : Analyze your findings about one identified thief. How can you learn from your chosen thief to acknowledge and recognize the motives and behavioral indicators that someone might be spying against the company you work for?
Draw the circuit of a free running multivibrator : Draw the circuit of a free running Multivibrator. Assuming Vdd = 15 V and Vss = -15 V, find the value of the resistors so that the trigger threshold is set at 12 V
Calculate the mass of anhydrous sodium carbonate : When titrated, 25ml of this solution requires 20.5ml of 0.5molL-1 sodium hydroxide solution for complete neutralisation. Calculate the mass of anhydrous sodium carbonate added to the hydrochloric acid solution.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Show the result of each pseudocode program

Show the result of each pseudocode program. Also rewrite pseudocode statements using Assignment statements. Given a simple business program that requires iteration, create a solution algorithm that employs loops.

  Z-transformation and fourier transformation

Find the z-transform and the Fourier transform of x(n). Find the N-point DFT of x (n) for N=50,10 and 5.

  Questionyour company has a benchmark that is considered

questionyour company has a benchmark that is considered representative of your typical applications. an embedded

  How automated accounting software can help management

Summarize the various accounting systems that each firm provides. Be sure to address the following for each firm: a. The various types of accounting systems it sells (e.g., Oracle sells Oracle Financials as well as PeopleSoft financials)

  Show how to build a j-k flip-flop

express how to build a J-K flip-flop using a T flip-flop with enable and combinational logic.

  Provide an example of a list and explain how it would be use

Provide an example of a ‘list' and explain how it would be used as part of a problem solution. Provide an example of an array and explain how it would be used as part of a problem solution.

  Explaining the binary tree

The left spine of the binary tree is a path starting at root and following only left-child pointers down to a leaf. State the expected number of nodes in left spine of an n-node treap. What is the expected number of leaves in an n-node treap?

  Prepare to discuss the article you find

Please type up a 1 page synopsis of no less than 350 words. Prepare to discuss the article you find at the beginning of the next class and submit a printed copy to the instructor.

  Overwrite the input and the number of local variables

overwrite the input and the number of local variables should not depend on n - Prepare pseudocode converting M to be stored in column major order.

  Requirements for telecommunications planning

Discuss what do you understand by the general estimate requirements for the enterprise telecommunications planning and also explain in detail the cable estimating procedures.

  Write down a class grade with a method getnumericgrade

note down  a Java program that translates a letter grade into a number grade. Letter grades are A B C D F, possibly followed by + or -. Their numeric values are 4, 3, 2, 1, and 0. There is no F+ or F-. A + increases the numeric value by 0.3, a - d..

  Boolean expressions to work out your logic

Write a program that determines, for each of the five hands of the game, whether or not then Ace is played. Use the truth tables and Boolean expressions to work out your logic for this.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd