What is the adversarys communication capability

Assignment Help Computer Engineering
Reference no: EM133814866

1. Cryptanalysis of the One-Time Pad

For this question, you need the encrypted ciphertexts downloaded from LEARN. There will be 3 blocks of ciphertexts. These were all encrypted with a one-time pad; however, they were all encrypted using the same key. You know that they are English language text in the utf8 encoding.

Give the plaintext messages which were encrypted.

Describe the methods you used to break this encryption (if you used computer code, attach any code as a PDF or image).

(There is no set marking scheme for this: it is mainly a chance to show your work).

2. Rationale of SPN Ciphers
Recall the basic construction of an SPN cipher: It proceeds through "rounds": where each round updates an internal state c with the following operations:
a) XOR the ith key onto c
b) Apply an S-Box to each byte of c
c) Apply the permutation P to c

This is illustrated below:

786_Rationale of SPN Ciphers.jpg

 

(for as many rounds as required).
In this question we will consider why this structure breaks completely if any one of the operations is removed.

For all of the modifications below, describe an effective attack against the encryption, more powerful than an indistinguishability attack.
All of your attacks should have complexity significantly lower than a brute-force key search. For all attacks, you must state the 3 components of the security model you have broken: what is the adversary's goal, what is the adversary's communication capability, and what is the computational power of the adversary? Get your questions answered now!

Assume the original SPN cipher is secure, i.e., this is a good S-box, a good permutation, and the key scheduling is secure.

If necessary, assume the S-box takes 8-bit inputs, the block length is 128 bits, the key length is 128 bits, and there are 16 rounds.
Suppose the permutation is removed, as shown below:

383_Rationale of SPN Ciphers1.jpg

 

Suppose the S-box is removed, as illustrated below:

459_Rationale of SPN Ciphers2.jpg

 

Suppose the key is not XORed into each round, as illustrated below:

2325_Rationale of SPN Ciphers3.jpg

 

Suppose the SPN only applies one round, as illustrated below:

662_Rationale of SPN Ciphers4.jpg

 

(Assume no whitening key is used at the end; for 1 bonus mark, describe an attack on a one-round SPN that does use a whitening key.)

3. Stream Ciphers
Suppose G is a secure pseudorandom bit generator, and we naively build a stream cipher as follows: Encrypt(k, m):
Select a random IV
Input k and IV into the PRBG to obtain a random string k′ as long as the message.
Output (IV,k′ ⊕ m).
Decrypt(k, (IV, c)):
Input k and IV into the PRBG to obtain a random string k′ as long as the ciphertext.
Output k′ ⊕ c.
Suppose the PRBG is secure. Show that this scheme is not IND-CCA secure.

Reference no: EM133814866

Questions Cloud

Adequate generalanesthesia was obtained : The patient was taken to the Operating Room where adequate generalanesthesia was obtained. Shewas prepped and draped in the usualsterile fashion in Allenstirrup
Reviewing is modified live vaccine : The vaccine described in the application you're reviewing is a modified live vaccine. Which of the following describes possible recombinant technologies
Make vaccines containing them problematic : Many adjuvants can cause inflammatory reactions that make vaccines containing them problematic.
Create a mind map with your topic as the focus : Create a mind map with your topic as the focus and then show these four areas on what you will explore, as well as on the interactions between different concept
What is the adversarys communication capability : C&O 487 Assignment - what is the adversarys goal, what is the adversarys communication capability, and what is the computational power of the adversary
Developing new drug for the treatment of Paget disease : A group of researchers is developing a new drug for the treatment of Paget disease.
Disorder related to sex-linked chromosomes : How is it possible for two people who do not have a disorder related to sex-linked chromosomes to have a child who does have a disorder?
How you met the eight outcomes in the course : Write an 8 to 10 pages paper that identifies how you met the eight outcomes in this course. Use an abbreviated version of the eight outcomes as headings.
Freshwater ponds between which there is little gene flow : On the Bahamian island of Andros, mosquitofish (Gambusia hubbsi) populations live in small isolated freshwater ponds between which there is little gene flow.

Reviews

len3814866

1/9/2025 11:20:54 PM

This has some small code for one-time pad encryption. The ipynb file has the same stuff as sage but in a python file. The symmetric historical pdf & stream cipher are the lectures. Co487_A1 is the assignment file. Question 1 requires a code to break and figure out the plaintext.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd