Symmetric encryption scheme

Assignment Help Basic Computer Science
Reference no: EM13523540

Consider the following symmetric encryption scheme (KG,E,D), which uses a pseudo-random permutation P, and a message authentication scheme (Gen, Tg,Vrfy) with unique tags. The key generation algorithm KG returns randomly chosen keys k1, k2. On input keys k1,k2 (returned by KG) and message m, the encryption algorithm E randomly chooses r, computes x=(r, m xor P(k1;r)) and returns ciphertext c=(x,Tg(k2;x)). On input keys k1,k2 (returned by KG) and ciphertext c, the decryption algorithm D writes c as (c1,c2), verifies whether Vrf(k2;(c1,c2))=1; if yes, it writes x as (x1,x2) and returns message m'=P(k1;x1) xor x2, otherwise it returns an error message. Which is the strongest security notion satisfied by the scheme (KG,E,D)?

A. Security in the sense of indistinguishability
B. Security in the sense of indistinguishability with chosen message attack
C. Security in the sense of indistinguishability with adaptive chosen message attack
D. Security in the sense of indistinguishability with chosen ciphertext attack

Please explain your reasoning.

Reference no: EM13523540

Questions Cloud

About moral issues and hold different moral standards : If men and women do think differently about moral issues and hold different moral standards, Ethics needs to incorporate the results into an appropriate ethical theory. What would be the two primary tenets of a male moral philosophy? What would be th..
Individuals happiness and thegeneral happiness : Utilitarianism holds that one should seek the ‘general happiness,’ not just one’s own happiness exclusively. But it is not clear how does a person figure out which course of action conforms to the Greatest Happiness Principle. Mill seems to tell u..
A symmetric encryption scheme : Consider the El Gamal encryption scheme, a symmetric encryption scheme
Problem with the labor theory of value : Locke does not believe that property appropriation (the activity of mixing one’s labor with natural resource and claim a right over it) will reduce the common property, why? What limits on private property does Locke establish? Once money is intro..
Symmetric encryption scheme : Symmetric encryption scheme
Reasoning involving relations of ideas-matters of fact : According to Hume, our belief in cause and effect cannot be justified by reasoning involving relations of ideas, nor by reasoning involving matters of fact. Explain Hume’s argument. (This question has two parts: first, you need to discuss the diffe..
Draw an activity diagram with swimlanes : Use Visio to draw this problem to draw an activity diagram with swimlanes.
Do you think decision statements can be replaced with loop : Do you think decision statements can be replaced with loops? If so, please provide example.
Thermoreceptors and touch receptors : Explain how adaption relates to our thermoreceptors and touch receptors. What is referred pain and how could it be dangerous?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create method that prints a rectangle of characters console

Create a method that prints a rectangle of characters to the console. The method should use a character set that parameter to the method.

  Which of the following is wrong

Which of the following is wrong? A. LDX #$5000 B. LDX #2550 C. LDX #$10000 D. LDX #$00 Explain Why!

  High-level descriptions of customer-s expectations

It needs to have high-level descriptions of the customer's expectations and the criteria for success. You need to describe why these are the best choices and why alternatives will not work as well.

  Write the verilog code for a two-input, two-bit adder

Write the Verilog code for a two-input, two-bit adder. The inputs are to be set by switches SW0-SW3 the three-bit result is to be displayed on LED0-2. Then write the Verilog code to add two hexadecimal integers stored in 4 bits each.

  Organisational changes to implement the long-term plan

What organisational changes are necessary in order to implement the long-term plan derived in question number two above?

  Describe a dbms and its functions updated dbms technology

Describe a DBMS and its functions. Name some of the popular DBMS software? You should search the Internet for the updated DBMS technology.

  Prepare disaster recovery plan for organization

Prepare a Disaster Recovery (DR) Plan for following organization; Company; Widget Works Electronics, Employees; 250, Infrastructure; 1 Central Office building housing primary datacenter. 10 satellite sales branches.

  Which three editions vista allow to join domain on network

Which three editions of Vista allow you to join a domain on a network

  How vulnerable do think the united states is to such attack

How would the actions of a hostile nation be any different than the actions of a hostile (competing) foreign company?

  Explain the concept of a dhcp lease

Explain the concept of a DHCP lease. How is it obtained? How is it used? What does it provide?

  What kind of a binary tree is the heap

What kind of a binary tree is the heap? Explain different operations of heaps. Compare heaps to binary search trees in term of efficiencies of main operations.

  Write a program that simulates an xor operation

For example, if the input is 1011, then the output will be 1. You can assume that the input word is guaranteed to contain only 0s and 1s.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd