Monday, July 6, 2015

Cryptography - Key Encription

Top Courses in IT & Software 728x90 1. Any private-key encryption scheme that is CPA-secure must also be computationally indistinguishable: True
2. Any private-key encryption scheme that is CCA-secure must also be perfectly secret: False
3. Any private-key encryption scheme that is CCA-secure must also be CPA-secure: True
4. Let F be a block cipher with 128-bit block length. Consider the following encryption scheme for 256-bit messages: to encrypt message M=m1m2 using key k (where |m1|=|m2|=128), choose random 128-bit r and compute the ciphertext rFk(r)m1Fk(m1)m2. Which strategy would lead to a valid chosen-plaintext attack?
  • Let m1 and m2 be arbitrary but distinct. Using the encryption oracle, obtain an encryption rc1c2 of m1m2. Output messages M0=m1m2 and M1=m2m1. Output 0 if the third block of the challenge ciphertext is c2.
5. Let F be a pseudorandom function with 128-bit key and 256-bit block length. The following functions G are pseudorandom generators:
  • G(x)=Fx(00)Fx(11), where x is a 128-bit input.
  • G(x)=Fx(00), where x is a 128-bit input.
Top Courses in Network & Security 728x90 6. Define the keyed function F as follows: Fk(x)=kx. Which of the following distinguishers demonstrates that F is not a pseudorandom function?
  • Given access to an oracle g, query y0=g(00) and y1=g(11). Then output 1 if and only if y0y1=11.
 
7. Say we use CBC-mode encryption based on a block cipher with 256-bit key length and 128-bit block length to encrypt a 512-bit message. How long is the resulting ciphertext?
  • 640 bits
 
8. Assume CTR-mode encryption with PKCS #5 padding and a block cipher with 8-byte block length. Say a 4-byte message is encrypted, resulting in ciphertext 0x00 01 02 03 04 05 06 07 00 01 02 03 04 05 06 07. Which of the following ciphertexts will NOT yield an error upon decryption?
  • 0x00 01 02 03 04 05 06 07 00 01 02 04 04 05 06 07
9. Assume an honest user wants to send an 8-bit integer to their bank indicating how much money should be transferred to the bank account of an attacker. The user uses CTR-mode encryption based on a block cipher F with 8-bit block length. (Yes, this is a made-up example.) The attacker knows that the amount of money the user wants to transfer is exactly $16, and has compromised a router between the user and the back. The attacker receives the ciphertext 10111100 01100001 (in binary) from the user. What ciphertext should the attacker forward to the bank to initiate a transfer of exactly $32? (Recall that CTR-mode decryption of a ciphertext c0,c1 using key k is done by outputting c1Fk(c0+1).)
  • 01100001 10111100
 10. Let F be a block cipher with n-bit block length. Consider the following encryption scheme: to encrypt a message viewed as a sequence of n-bit blocks m1,m2,,mt using a key k, choose a random n-bit value r and then output the ciphertext r,Fk(r+1+m1),Fk(r+2+m2),,Fk(r+t+mt), where addition is done modulo 2n. Which of the following attackers demonstrates that this scheme is not computationally indistinguishable:

  • Let m be an arbitrary n-bit block, and output M0=m,m and M1=m,m1. Given challenge ciphertext r,c1,c2, output 1 if and only if c1=c2.

5 comments:

  1. in question 7 wont key length create any difference?

    ReplyDelete
    Replies
    1. Hello everyone..

      I'm selling fresh leads. Details in leads are:

      Full name
      SSN
      DOB
      Phone Numbers
      Address
      City
      State
      Zip
      Residential Status
      Account Number
      DL number
      Emails

      All leads are genuine, fresh & generated by spaming, I Will provide you samples for checking if u want.

      Dealing in almost all types of leads.

      SSN Leads
      Dead Fullz
      Premium Leads
      Mortgage Leads
      Bank Account Leads
      Employee Leads
      Business Leads
      Home Owners Leads
      DL Leads
      Emails Leads
      Phone Numbers Leads

      Each lead will b cost $1.

      Also cvv Fullz available track 1 & track 2 with pin.

      Interested person contact, scammers stay away, sampling is free of cost.

      email > leads.sellers1212@gmail.com
      Whatsapp > +923172721122
      Telegram > @leadsupplier
      ICQ > 752822040

      Delete
  2. Hello everyone..

    I'm selling fresh leads. Details in leads are:

    Full name
    SSN
    DOB
    Phone Numbers
    Address
    City
    State
    Zip
    Residential Status
    Account Number
    DL number
    Emails

    All leads are genuine, fresh & generated by spaming, I Will provide you samples for checking if u want.

    Dealing in almost all types of leads.

    SSN Leads
    Dead Fullz
    Premium Leads
    Mortgage Leads
    Bank Account Leads
    Employee Leads
    Business Leads
    Home Owners Leads
    DL Leads
    Emails Leads
    Phone Numbers Leads

    Each lead will b cost $1.

    Also cvv Fullz available track 1 & track 2 with pin.

    Interested person contact, scammers stay away, sampling is free of cost.

    email > leads.sellers1212@gmail.com
    Whatsapp > +923172721122
    Telegram > @leadsupplier
    ICQ > 752822040

    ReplyDelete
  3. Hello all
    am looking few years that some guys comes into the market
    they called themselves hacker, carder or spammer they rip the
    peoples with different ways and it’s a badly impact to real hacker
    now situation is that peoples doesn’t believe that real hackers and carder scammer exists.
    Anyone want to make deal with me any type am available but first
    I‘ll show the proof that am real then make a deal like

    Available Services

    ..Wire Bank Transfer all over the world

    ..Western Union Transfer all over the world

    ..Credit Cards (USA, UK, AUS, CAN, NZ)

    ..School Grade upgrade / remove Records

    ..Spamming Tool

    ..keyloggers / rats

    ..Social Media recovery

    .. Teaching Hacking / spamming / carding (1/2 hours course)

    discount for re-seller

    Contact: 24/7

    fixitrogers@gmail.com

    ReplyDelete