Symmetric encryption scheme

Assignment Help Basic Computer Science
Reference no: EM13523540

Consider the following symmetric encryption scheme (KG,E,D), which uses a pseudo-random permutation P, and a message authentication scheme (Gen, Tg,Vrfy) with unique tags. The key generation algorithm KG returns randomly chosen keys k1, k2. On input keys k1,k2 (returned by KG) and message m, the encryption algorithm E randomly chooses r, computes x=(r, m xor P(k1;r)) and returns ciphertext c=(x,Tg(k2;x)). On input keys k1,k2 (returned by KG) and ciphertext c, the decryption algorithm D writes c as (c1,c2), verifies whether Vrf(k2;(c1,c2))=1; if yes, it writes x as (x1,x2) and returns message m'=P(k1;x1) xor x2, otherwise it returns an error message. Which is the strongest security notion satisfied by the scheme (KG,E,D)?

A. Security in the sense of indistinguishability
B. Security in the sense of indistinguishability with chosen message attack
C. Security in the sense of indistinguishability with adaptive chosen message attack
D. Security in the sense of indistinguishability with chosen ciphertext attack

Please explain your reasoning.

Reference no: EM13523540

Questions Cloud

About moral issues and hold different moral standards : If men and women do think differently about moral issues and hold different moral standards, Ethics needs to incorporate the results into an appropriate ethical theory. What would be the two primary tenets of a male moral philosophy? What would be th..
Individuals happiness and thegeneral happiness : Utilitarianism holds that one should seek the ‘general happiness,’ not just one’s own happiness exclusively. But it is not clear how does a person figure out which course of action conforms to the Greatest Happiness Principle. Mill seems to tell u..
A symmetric encryption scheme : Consider the El Gamal encryption scheme, a symmetric encryption scheme
Problem with the labor theory of value : Locke does not believe that property appropriation (the activity of mixing one’s labor with natural resource and claim a right over it) will reduce the common property, why? What limits on private property does Locke establish? Once money is intro..
Symmetric encryption scheme : Symmetric encryption scheme
Reasoning involving relations of ideas-matters of fact : According to Hume, our belief in cause and effect cannot be justified by reasoning involving relations of ideas, nor by reasoning involving matters of fact. Explain Hume’s argument. (This question has two parts: first, you need to discuss the diffe..
Draw an activity diagram with swimlanes : Use Visio to draw this problem to draw an activity diagram with swimlanes.
Do you think decision statements can be replaced with loop : Do you think decision statements can be replaced with loops? If so, please provide example.
Thermoreceptors and touch receptors : Explain how adaption relates to our thermoreceptors and touch receptors. What is referred pain and how could it be dangerous?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use electronic monitoring to measure employee productivity

A discussion of the current trend to use electronic monitoring to measure employee productivity, bearing in mind the theories of Taylor and McGregor. The key ethical issues and the stakeholders involved.

  Security by implementing database auditing

You are a DBA for corporation's databases. The management has decided to increase security by applying database auditing yet they are unspecific what actions to audit.

  Write a method called median

Write a method called median that accepts an array of integers as its argument and returns the median of the numbers in the array. The median is the number that will appear in the middle if you arrange the elements in order

  What input function is used to read a single character

What functions are used instead of the >> and

  Write the function xsort which takes in a list of strings

Write the function Xsort wich takes in a list of strings and returns sorted list with all words beginning wih "X" first in the list. f.ex: xsort (['kex', 'xylofonn', 'epli', 'xenos', 'asni']) returns ['xenos', 'xylofonn', 'asni', 'epli', 'kex'] th..

  First name, last name, phone number

First Name, Last Name, Phone Number, email address (add additional elements as desired)  2. Include a search criteria based on last name or any of the elements created for your phone book entries in order to retrieve the information requested.

  People and organization responsible for bumping problems

Answer from the perspective of the airlines and from the perspective of the customers. What people, organization, and technology factors are responsible for excessive bumping problems?"

  Decreasing risk of malicious attacks in personal systems

Security budgets is devoted to decreasing risk of malicious attacks. What threats are you aware of when it comes to the personal systems and systems at job

  Nist criteria for selection of des and aes relate to shannon

How do the NIST criteria for selection of DES and AES relate to Shannon's original standards of a good cryptographic system?

  What is the output of the following program

What is the output of the following program?

  What do you mean by ascii or ebcdic

What is ASCII or EBCDIC? What part do the aforementioned things play in hashing? What is the formula for the PPD? What does the numerator and denominator say about the potential performance issues of this metric?

  Page file is stored in a solid state drive

Assuming that the page file is stored in a Solid State Drive (SSD) and the Translation Look-aside Buffer (TLB) is stored in cache, what is the Effective Access Time (EAT) of a memory access in a memory subsystem

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd