Show that given encryption system is perfectly secure for m

Assignment Help Computer Network Security
Reference no: EM131225724

Instructions

Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below.

Problem 1. We consider the alphabet A= {0,1,2,3,4} and the space of messages consists of all 1-symbol words, so it is M ={0,1,2,3,4}. The encryption is done using the shift cipher, so it is given by the equation X = x+k (mod 5) applied to each letter of the plaintext (as discussed in class, x is the letter that we encrypt, k is the secret key, and X is the encrypted letter).

a. Suppose Eve knows that the symbols 0 and 1 have the same probability Prob(M=0)=Prob(M=1) = a, and the symbols 2,3, and 4 have the same probability Prob(M=2) = Prob(M=3) = Prob(M=4) = b, and she also knows that 0 is 2 times more likely than 2, so she knows that a = 2b. Find a and b. (Hint: use the fact that the sum of all probabilities is 1).

b. Calculate Prob (M= 2 | C = 4) (according to Eve's distribution). Recall that C= EK(M), that is the ciphertext is obtained by encrypting the message M (which is drawn according to Eve's distribution which you found at point a.), and the key is equally likely to be any number in the set {0,1,2,3,4}. You'll have to use the formula for conditional probability (see the notes, and the proof of Shannon's theorem).

c. Show that the given encryption system is perfectly secure for M, by checking the definition given in class for perfect security - version 1 (Note: As we did in the proof of the perfect security for one-time pad, you need to consider an arbitrary distribution on M, because the definition must hold for all possible distributions).

Problem 2. The alphabet is the same as in Problem 1, but now the space of messages consists of all 2-symbol words, so it is M1 ={(0,0),(0,1), ...(4,3),(4,4)}. Eve knows that the individual symbols 0, 1,2,3,4 have the same probabilities as in Problem 1, and that the two symbols in a word are independent. The encryption is again the shift cipher (recall that this means that the 2-symbol word
(x1, x2) is encrypted as the 2-symbol word (x1+k, x2+k), where k is the key and addition is modulo 5.)

a. Calculate Prob(M=(1,4)). (Hint: This is very simple, just use that the two symbols are independent).

b. Calculate Prob(M=(1, 4) | C = (2, 0)). (Hint: You'll use of course the formula for conditional probability. For the numerator, take into account that the key has to be 1. For the denominator, you need to look at all combinations (message, key) that can produce the ciphertext (2,0). Again use as a model, the proof of Shannon's theorem given in the notes, but adapt to this situation).

c. Using the formal definition of perfect security, explain what the results from (a) and (b) say about whether the shift cipher is perfectly secure for this M1.

Reference no: EM131225724

Questions Cloud

Assignment-physician reimbursement : Directions: With the increasing cost of health care, MCOs have been under tremendous pressure to control health care costs, including physician reimbursement. In this assignment, you are to look at some of the issues that are involved in physician..
Process of improving customer service : Discuss the process of improving customer service in order to ensure consistent excellent customer service.
Key areas of expected improvement such as reduced lead times : Benefits of implementing or improving MRP in an organization (list at least 15 key areas of expected improvement, such as reduced lead times). Five selected items from your list of 15 expected improvements, along with descriptions about how a compani..
Focus on interest-not position : Explain the ideal that we should "focus on interest, not position" can you think of an example in which you successfully negotiated with someone else using this principle?
Show that given encryption system is perfectly secure for m : Calculate Prob (M= 2 | C = 4) (according to Eve's distribution). Show that the given encryption system is perfectly secure for M, by checking the definition given in class for perfect security - version 1.
How do we as patients measure excellence : What does excellence in health care look like? How do we as patients measure excellence? How do health care professionals measure excellence?
Choice of an organization structure : How is the choice of an organization's structure related to the environment in which it operates?
Had the subordination clause not been signed : Had the subordination clause not been signed, both Wells Fargo and the competitor bank receive 85.7% of their claim amount, which is $4.287 Million and $3.913 Million. In this case Wells Fargo would be worse off, while the competitor is relatively..
Beach air potential legal liability for passenger injuries : Beach Air Corp is a scheduled air carrier serving the southeastern US, Bahamas and Caribbean islands with regional turboprop aircraft. One morning, two Beach Air flights are boarding passengers on the regional airline ramp at Orlando, FL. One flight ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Give the sql statement

Give the SQL statement that will find the best selling product(most frequently sold). Output the product name and number sold.

  Most threatening security issues firms have to deal with

Research current security trends, countermeasures, and threats. What will be the most threatening security issues firms have to deal with within the next five years?

  Determine impact of at least five potential logical threats

Determine the impact of at least five (5) potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from ..

  About inf 620

How well did the systems approach work for the initial stages of the Primis system?What could the team have done differently in the preliminary stages? How might this have affected the endresult?

  Incident and crime scene procedures

Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.

  Determine the impact of five potential logical threats

Identify at least five (5) potential physical threats that require attention. Determine the impact of at least five (5) potential logical threats that require attention.

  Prepare research paper on defending against virus attacks

Prepare a research paper on Defending against Virus Attacks - You will create a 6 to 8 page research paper. Please include an introduction, body and conclusion. You need to also include at least eight references with in-text citations.

  What paperwork will be needed to reach eal7 certification

Essay Question:Secure software certification. Your present company (assignment#2) is at EAL4. You are the new program manager on this effort and your job is to bring your present software secure package to EAL7.

  Examine the various types of encryptions

Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Examine the various types of encryptions and choose the one that you would recommend that your organization use. Provide a rationale for your response.

  Importance of maintaining the secure computing environment

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

  Why is facebook protected from liability for content

Why is Facebook protected from liability for content posted by third parties. Do you think that Facebook and other social network providers should be protected from liability for what their members post. Why or why not

  What is computer security

Computer security is integral part of any organization, if any organization hasstarted working in, immediately it should start Computer security for its systemif they want to protect their system for future.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd