Show that given encryption system is perfectly secure for m

Assignment Help Computer Network Security
Reference no: EM131225724

Instructions

Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below.

Problem 1. We consider the alphabet A= {0,1,2,3,4} and the space of messages consists of all 1-symbol words, so it is M ={0,1,2,3,4}. The encryption is done using the shift cipher, so it is given by the equation X = x+k (mod 5) applied to each letter of the plaintext (as discussed in class, x is the letter that we encrypt, k is the secret key, and X is the encrypted letter).

a. Suppose Eve knows that the symbols 0 and 1 have the same probability Prob(M=0)=Prob(M=1) = a, and the symbols 2,3, and 4 have the same probability Prob(M=2) = Prob(M=3) = Prob(M=4) = b, and she also knows that 0 is 2 times more likely than 2, so she knows that a = 2b. Find a and b. (Hint: use the fact that the sum of all probabilities is 1).

b. Calculate Prob (M= 2 | C = 4) (according to Eve's distribution). Recall that C= EK(M), that is the ciphertext is obtained by encrypting the message M (which is drawn according to Eve's distribution which you found at point a.), and the key is equally likely to be any number in the set {0,1,2,3,4}. You'll have to use the formula for conditional probability (see the notes, and the proof of Shannon's theorem).

c. Show that the given encryption system is perfectly secure for M, by checking the definition given in class for perfect security - version 1 (Note: As we did in the proof of the perfect security for one-time pad, you need to consider an arbitrary distribution on M, because the definition must hold for all possible distributions).

Problem 2. The alphabet is the same as in Problem 1, but now the space of messages consists of all 2-symbol words, so it is M1 ={(0,0),(0,1), ...(4,3),(4,4)}. Eve knows that the individual symbols 0, 1,2,3,4 have the same probabilities as in Problem 1, and that the two symbols in a word are independent. The encryption is again the shift cipher (recall that this means that the 2-symbol word
(x1, x2) is encrypted as the 2-symbol word (x1+k, x2+k), where k is the key and addition is modulo 5.)

a. Calculate Prob(M=(1,4)). (Hint: This is very simple, just use that the two symbols are independent).

b. Calculate Prob(M=(1, 4) | C = (2, 0)). (Hint: You'll use of course the formula for conditional probability. For the numerator, take into account that the key has to be 1. For the denominator, you need to look at all combinations (message, key) that can produce the ciphertext (2,0). Again use as a model, the proof of Shannon's theorem given in the notes, but adapt to this situation).

c. Using the formal definition of perfect security, explain what the results from (a) and (b) say about whether the shift cipher is perfectly secure for this M1.

Reference no: EM131225724

Questions Cloud

Assignment-physician reimbursement : Directions: With the increasing cost of health care, MCOs have been under tremendous pressure to control health care costs, including physician reimbursement. In this assignment, you are to look at some of the issues that are involved in physician..
Process of improving customer service : Discuss the process of improving customer service in order to ensure consistent excellent customer service.
Key areas of expected improvement such as reduced lead times : Benefits of implementing or improving MRP in an organization (list at least 15 key areas of expected improvement, such as reduced lead times). Five selected items from your list of 15 expected improvements, along with descriptions about how a compani..
Focus on interest-not position : Explain the ideal that we should "focus on interest, not position" can you think of an example in which you successfully negotiated with someone else using this principle?
Show that given encryption system is perfectly secure for m : Calculate Prob (M= 2 | C = 4) (according to Eve's distribution). Show that the given encryption system is perfectly secure for M, by checking the definition given in class for perfect security - version 1.
How do we as patients measure excellence : What does excellence in health care look like? How do we as patients measure excellence? How do health care professionals measure excellence?
Choice of an organization structure : How is the choice of an organization's structure related to the environment in which it operates?
Had the subordination clause not been signed : Had the subordination clause not been signed, both Wells Fargo and the competitor bank receive 85.7% of their claim amount, which is $4.287 Million and $3.913 Million. In this case Wells Fargo would be worse off, while the competitor is relatively..
Beach air potential legal liability for passenger injuries : Beach Air Corp is a scheduled air carrier serving the southeastern US, Bahamas and Caribbean islands with regional turboprop aircraft. One morning, two Beach Air flights are boarding passengers on the regional airline ramp at Orlando, FL. One flight ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd