Cloud-computing security, Spring 2013 Homework Assignment 3 Due: 9:10, May 10, 2013 1. Assume a public-key encryption scheme for single-bit messages. Show that, given pk and a ciphertext c computed via c ← Encpk (m), it is possible for an unbounded adversary to determine m with probability 1. This shows in particular that perfectly-secret public-key encryption is impossible. 2. Say a deterministic public-key encryption scheme is used to encrypt a message m that is known to lie in a small set of N possible values. Show how it is possible to determine m in time linear in N . 3. Let p = 11, q = 23, and e = 3. Encrypt the binary message m = 0111001 using the textbook RSA with respect to the key pk = hN = pq, ei. Then decrypt the ciphertext. You can either write a software program to help you carry out the computation or use a calculator to accomplish the task. 4. Imagine that a company wants to use the same modulus N for each of its employees for the textbook RSA. Since it is not desirable for messages encrypted to one employee to be read by any other employee, the company issues different (ei , di ) to each employee. That is, the public key of the ith employee is pki = hN, ei i and their private key is sk = hN, di i, where ei · di = 1 mod φ(N ) for all i. Show that this approach is insecure in the sense that it allows any employee to read messages encrypted to all other employees. 5. Here we show a scenario indicating that sharing a modulus is really a bad idea. Say the same message m is encrypted and sent to two different (known) employees with public keys (N, e1 ) and (N, e2 ) (e1 6= e2 ). Assume further than gcd(e1 , e2 ) = 1. Then an eavesdropper sees the two ciphertexts c1 = me1 mod N and c2 = me2 mod N . Show that this allows the eavesdropper to decrypt m without knowing any private keys.

1

Cloud-computing security, Spring 2013 Homework ...

Cloud-computing security, Spring 2013. Homework ... Encrypt the binary message m = 0111001 using the textbook RSA with respect to the key pk = 〈N = pq, e〉.

69KB Sizes 0 Downloads 124 Views

Recommend Documents

Spring 2013 Newsletter.pdf
Sign in. Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... Spring 2013 Newsletter.pdf. Spring 2013 Newsletter.pdf. Open.

spring 2013.pdf
Page 1 of 6. New York University. Department of English. Spring 2013 Course Schedule. Course No. Title Instructor Day Time Enrollment. Core Courses.

HOMEWORK
Homework​​is one​​of​​the​​options​​parents/legal​​guardians​​have​​to​​support​​their​​child's learning.

ASIB Proceedings Spring 2013.pdf
Kishor Kumar Guru-Gharana, Texas A&M University-Commerce ... Narendra C. Bhandari, Pace University ... Page 3 of 27. ASIB Proceedings Spring 2013.pdf.

draft-Spring Concert day 2013
Apr 28, 2013 - Mozart Players & Amadeus Players - Concert Clothes. Girls: White top with 3/4 length or longer sleeves. Black pants or skirt that covers the knees when seated. Black closed-‐toe shoes. Boys: White long-‐sleeve, button-‐down shirt

pro spring security pdf
... automatically. Page 1 of 1. pro spring security pdf. pro spring security pdf. Open. Extract. Open with. Sign In. Main menu. Displaying pro spring security pdf.

Homework 1
Question 3. As you have learnt, a number of hosts using Ethernet, share a single channel and each collision decreases throughput. If hosts on a 6-host 10Mbps 80m Ethernet LAN send frames 64byte long, a. what is the scenario that maximizes throughput

Homework 3
Lecture 6: Programming in R. 1) Load the warpbreaks data set and attach it.* This data set gives the number of warp breaks per loom, where a loom corresponds ...

Homework #1 - GitHub
Please select either bus 2 or 3 as reference bus, calculate the line flows, and check if the results are the same. 2. Come up with a case study of LP, and solve it in ...

(Surrey), Spring 2013 Midterm 1 Guidelines The ... - SLIDEBLAST.COM
in the atmospheric carbon dioxide concentrations since the 1950's. ... List some of the factors that led to the increase in CO2 concentrations over the last century.

Homework Hotline.pdf
Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Homework Hotline.pdf. Homework Hotline.pdf. Open. Ex

Homework 12 - Magnetism - GitHub
region containing a constant magnetic field B = 2.6T aligned with the positive ... With what speed v did the particle enter the region containing the magnetic field?

Homework Practice - WinningWithLinningMath
of the girls have blue eyes, what fraction of the girls in class have neither blue or brown eyes? 16. PIE Ubi made a banana cream pie. His brother ate. 1. −. 3.

homework
ventus and I was in San Siro Stadium when Inter won the. 'scudetto' with a 5-0 win. 2003 was the first year Valletta qualified for the UEFA. Champions League and the fist game was Valletta versus AC. Milan. Ta' Qali was in a craze when Massimo scored

Homework #4
Returned: Friday, March 25, 2016. 1. Growth of structure with neutrinos. [30 points; 5 points each]. In most of our studies of the matter-dominated era in class, we ...

SPL Announcement and supplemental Spring 2013.pdf
You are responsible for providing basic landscape and maintenance services such as pulling. weeds, raking, restroom cleaning, trash pick-up, etc. In addition ...

homework-help.pdf
Page 1 of 22. Alternative Homework Ideas. We compiled this list from ideas collected from the Love and Logic Insider Club. members. Thank you to everyone ...

Homework 2
Recall the unitary group U1 = {z ∈ C | |z| = 1}. Find all the one dimensional continuous complex representations of U1. 5. Let G be a finite group. Let ρ : G −→ GLn(R) be an n-dimensional real representation. Prove that there exists a matrix Ï