Question

In: Computer Science

Topic: Encrypt-then-authenticate scheme, Cryptography Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM...

Topic: Encrypt-then-authenticate scheme, Cryptography

Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM = (GenM, MacM, VrfyM) be a MAC scheme.

(a) Formalize the construction of the “encrypt-then-authenticate” scheme Π = (Gen, Enc, Dec) given ΠE and ΠM

Solutions

Expert Solution

SOLUTION-

(a) Encrypt then authenticate scheme

​​​​​​The message is first encrypted and then authenticated

c = Enck1(m), t= Mack2(c)

Let IIE be a CPA secure private key encryption scheme.

Let IIM be a secure message authentication code with unique tags. Then the combination (Gen, Enc, Mac, Dec) derived by applying the encrypt then authenticate approach to IIE and IIM is a secure message transmission scheme.

A pair of computationally independent keys, κa and κe, are derived from each session key. Then, for each transmitted message, m, a unique message identifier m-id is chosen.Finally, the function produces a triple (x, y, z) where x = m-id, y = ENCκe(m), z = MACκa(m-id, y).
On an incoming message (x0, y0, z0) the rcv function verifies the uniqueness of message identifier x0 and the validity of the MAC tag z (comped on (x0, y0));if the checks succeeds y0
is decrypted under key κe and the resultant plain text accepted as a valid message.

the authentication of the ciphertext provides plaintext
integrity as long as the encryption and decrypt
on keys used at the sender and receiver, respectively, are the same. While this key synchrony is implicit in our analytical models a key mismatch can happen in practice. A system concerned with detecting such cases can check the plaintext for redundancy information (such redundancy exists in most probabilit applications: e.g., message formats,non-cryptographic checksums, etc.). If the redundancy entropy is significant then
a key mismatch will corrupt this redundancy with high probability.

IF YOU HAVE ANY DOUBT PLEASE COMMENT DOWN BELOW I WILL SOLVE IT FOR YOU:)
----------------PLEASE RATE THE ANSWER-----------THANK YOU!!!!!!!!----------


Related Solutions

Topic: Encrypt-then-authenticate scheme, Cryptography Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM...
Topic: Encrypt-then-authenticate scheme, Cryptography Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM = (GenM, MacM, VrfyM) be a MAC scheme. (b) Prove that Π is unforgeable for any encryption scheme ΠE (even if not CPA-secure) and any secure MAC scheme ΠM (even if not strongly secure).
How do we encrypt? Explain modern symmetric cryptography. Explain the digital signature scheme. Explain the cryptography...
How do we encrypt? Explain modern symmetric cryptography. Explain the digital signature scheme. Explain the cryptography tools. What is digital signature? What is steganography? Explain the protocol for secure communications.
One research topic in cryptography is to create homomorphic encryption schemes. In such schemes, it is...
One research topic in cryptography is to create homomorphic encryption schemes. In such schemes, it is possible to do operations on the ciphertext without performing decryption. Give an example of where homomorphic encryption would be useful. You do not have to give a specific cryptographic method but describe a situation where you would want to do computations on ciphertext. Be specific: what is the information, what is encrypted, and what the computation is. Related concept: given an RSA scheme with...
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using...
These questions are about math cryptography 1) Encrypt the plaintext "this is a secret message" using the affine function f(x) = 5x + 7 mod 26. 2) Determine the number of divisors of 2n, where n is a positive integer.
In cryptography, Caesar cipher is one of the simplest encryption techniques. The key idea of this...
In cryptography, Caesar cipher is one of the simplest encryption techniques. The key idea of this method is to replace each plaintext letter with one fixed number of places down the alphabet. Below is an example with a shift of three: Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz Cipher: DEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzABC To cipher a string, ‘A’ is replaced by ‘D’, ‘B’ is substituted by ‘E’, and so on. To decode a string, ‘A’ is replaced by ‘x’, etc. By using python with vs code: Write a...
Cryptography*** For DES, what is the probability that two different keys will encrypt atleast 1 plaintext...
Cryptography*** For DES, what is the probability that two different keys will encrypt atleast 1 plaintext message to the same ciphertext output?
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with...
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with descritpions.
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and...
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and K2 respectively. Is this method more secure than the regular single DES encryption? Please explain your reason.
All of the remaining questions involve the following toy encryption scheme. It encrypts plaintexts that consist...
All of the remaining questions involve the following toy encryption scheme. It encrypts plaintexts that consist of only uppercase letters and the underscore character (27 characters total): ABCDEFGHIJKLMNOPQRSTUVWXYZ_ Note that the underscore character is part of the alphabet and will also be encrypted. A key in this scheme consists of 4 digits, each from 0 to 9. Each digit tells how much to shift one character, that is, change it to the character that many positions later in the alphabet....
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT