Question

In: Computer Science

Show that ECB is not CPA secure if the length of the message is more than...

Show that ECB is not CPA secure if the length of the message is more than two blocks. (Hint: Use the CPA security game and show a successful attack strategy).

Solutions

Expert Solution

Electronic control block (ECB) is mode of operation for a block cipher , with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. It is used when a volume of plaintext is seperated into several block of data , each of which is then encrypted independently of other blocks. While Electronic code block is not beneficial to use with small block size and identical encryption mode. This is because some words and phrases may be reused often enough

So that the same repetitive part blocks of cipher text can emerge , laying the groundwork for a codebook attack where the plain text patterns are fairly obvious.

Choosen plaintext attack(CPA) is an attack model for cryptanalysis which presumes the attacker can obtain the ciphertext for arbitrary plaintexts.The goal of attack is to gain information that reduces the security of the encryption scheme.

Example..

Let P1 be plaintext we would like to decrypt and P2 be plaintext we get by adding some "A"'s to P1 . Now what we actually want to craft is P2 plaintext by looking individual blocks.

Notice that block 2 contains 15 A's and the first byte of unknown plaintext P1. Being able to know the offset and inject the plaintext as above ,it is then possible to brute force the 16th byte in block2 . First make sure to send P2 to the encryption Oracle to have a reference value (the one we will be looking for when brute forcing).

Note that the reference block is the second block encrypting P2. This is because it is particular block that now contains 15 A's and one secret byte. The idea is now to brute force that secret byte by iterate through all 256 combinations with 15 A's and last byte changing to 256 possible characters. Encrypt all 256 combinations using Oracle and when one of these encryption produces a cipher text with second block matching reference block we know that secret byte is . Yes, the ASCII for 0,1 and 255 is not a,b and Z, but above is just for illustration .

Create all plaintext and encrypt them and extract the second block and compare to "B8C42B6F757C16293F11B714647846F" which was the reference block in example . When a match is found ,check with ASCII value was used -that is plaintext value for the secret byte . Now the rest just follows craft with a plaintext P3 with 14 A's, the byte you just found and then the

Second secret byte in the end . Repeat the procedure . Hence the cipher got its information and attack got successful.


Related Solutions

Good explanation of more than 3 benefits of CPA to the company
Good explanation of more than 3 benefits of CPA to the company
"Now the Bereans were of more noble character than the Thessalonians, for they received the message...
"Now the Bereans were of more noble character than the Thessalonians, for they received the message with great eagerness and examined the Scriptures every day to see if what Paul said was true." Acts 17:11. I think this is a lesson that can be taken into the world today. I believe that it is important to be eager about things because it shows that you care. If you want to be promoted in the work place, it is absolutely essential...
Excellent explanation of more than 3 benefits of CPA to the company linking the components of...
Excellent explanation of more than 3 benefits of CPA to the company linking the components of CPA to the activities in sales/marketing. Excellent explanation of more than 3 benefits of Certified Public Accountant to the company with limited linkage to the activities in sales/marketing. ( 300 words)
What cryptographic transport algorithm is considered to be significantly more secure than SSL? A. AES B....
What cryptographic transport algorithm is considered to be significantly more secure than SSL? A. AES B. HTTPS C. DES D. TLS
Part 01 It is stated that digital signatures are more secure than handwritten signatures. Give three...
Part 01 It is stated that digital signatures are more secure than handwritten signatures. Give three (3) arguments to support the above statement and one (1) argument to counter the above statement. Part 02 Briefly explain two (02) advantage of a Public Key Cryptosystem (PKC) over asymmetric cryptosystem (shared secret key) from the perspective of networking.
How different is it to be a CPA in Uk than being a CPA in USA?...
How different is it to be a CPA in Uk than being a CPA in USA? I want the similarities and differences
Students will write a strategy paper with a length of no more than 1,000 words. This,...
Students will write a strategy paper with a length of no more than 1,000 words. This, strategy paper will focus on a goal defined by you. That goal should be a personal objective of yours. The goal can be short-term and tactical or a strategic, long-range goal. The paper will also explain the key organizational and cultural requirements expected to meet the goal you have defined and a plan for identifying those requirements in prospective places to work. The Paper...
Are static web pages more or less secure than dynamic web pages? What can make dynamic...
Are static web pages more or less secure than dynamic web pages? What can make dynamic web pages insecure? Why do developers insist on using dynamic web pages?
Your Discussion should be a minimum of 250 words in length and not more than 450...
Your Discussion should be a minimum of 250 words in length and not more than 450 words. Please include a word count. Following the APA standard, use references and in-text citations for the textbook and any other sources. For this week's discussion assignment, refer to the Heisinger & Hoyle (2012) resource, The Effect of Income Taxes on Capital Budgeting Decisions. Describe and explain capital budgeting items that may or may not be taxed as part of a capital budget project.
A PowerPoint presentation no more than 15 slides in length that addresses the following: Identify and...
A PowerPoint presentation no more than 15 slides in length that addresses the following: Identify and explain any legal implications that exist for failure to adhere to a standard of care Identify and explain the key elements of malpractice Compare the differences in malpractice policy options
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT