What can you learn about m0 and m1

Assignment Help Computer Engineering
Reference no: EM132164243

When using block-cipher mode of opeartion, in particular, CTR and CBC modes, it is important that the Initialization Vectors (IV) is chosen uniformly and randomly upon every invocation of the encryption algorithm, so that, the probability that the same IV is chosen in two invocation of the encryption algorithm is very small. So what really happens when the IVs do collide?

Let E : {0, 1} k × {0, 1} l ? {0, 1} l be the block cipher used in the CTR and CBC mode. Consider encrypting two messages M0 = M0[1]M0[2] · · · M0[q] and M1 = M1[1]M1[2] · · · M1[q], each consisting of exactly q blocks of length l.

1. Encrypt M0 and M1 using CTR mode to obtain ciphertexts C0 = C0[0]C0[1] · · · C0[q] and C1 = C1[0]C1[1] · · · C1[q]. If it happens that C0[0] = C1[0], what can you learn about M0, M1 from C0, C1?

2. Instead of CTR mode, the CBC mode is used to encrypt the messages. Again, if it happens that C0[0] = C1[0], what can you learn about M0, M1 from C0, C1?

No more info is needed, this is all that is given.

Reference no: EM132164243

Questions Cloud

Design a training plan based on the findings in your tna : Design a training plan based on the findings and training outcomes revealed in your TNA.
How much does the insurance company : How much does the insurance company have to pay under the terms of its policy?
Discuss how technology can affect management with examples : Discuss how technology can affect management with examples
Wrote a cyber liability policy : An insurance company wrote a cyber liability policy with a $4 million policy limit and agreed to perform its duty to defend within policy limits
What can you learn about m0 and m1 : When using block-cipher mode of opeartion, in particular, CTR and CBC modes, it is important that the Initialization Vectors (IV) is chosen uniformly.
Many organizations possess culture full of competition : Many organizations possess a culture full of "competition" between employees for recognition, jobs, promotion, higher pay, etc.
Million limit and defense costs outside limits : It wrote a similar policy with a $3 million limit and defense costs outside limits. The premium was the same for both policies. Which is better for the insured?
What are the 5-bit 2s complement binary bit patterns : Find product of a and b using "paper and pencil" method, i.e. first calculating partial products and then performing summation of partial products.
Explain the human activities in detail : Introduction: The Florida Springs seem to be in the news quite a bit in 2015 mainly due to the challenges that they face in overcoming pressures.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd