subject

Suppose Bob and Alice want to flip a coin over a network and decide who is the winner. Alice proposes the following protocol.

(i) Alice randomly selects a value X in {0,1} (i. e., either 0 or 1).
(ii) Alice generates a 256-bit random symmetric key K.
(iii) Using the AES cipher, Alice computes Y = E(X, R,K), where R consists of 255 randomly selected bits.
(iv) Alice sends Y to Bob.
(v) Bob guesses a value Z £ {0,1} and tells Alice.
(vi) Alice gives the key K to Bob who computes (X, R) = D(Y, K).
(vii) If X = Z then Bob wins, otherwise Alice wins.

This protocol is insecure.

a. Explain how Alice can cheat.
b. Using a cryptographic hash function h, modify this protocol so that Alice cannot cheat.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:20
How might the success of your campaign be affected if you haven’t carefully completed all field data or if you accidentally insert the wrong merge field in the document?
Answers: 2
question
Computers and Technology, 22.06.2019 23:30
The next button in the review section shows the next available comment. next slide with no comment. previous comment. edited comment.
Answers: 1
question
Computers and Technology, 23.06.2019 01:40
You have a linux system that has a 1000gb hard disk drive, which has a 90gb partition containing an ext4 filesystem mounted to the / directory and a 4gb swap partition. currently, this linux system is only used by a few users for storing small files; however, the department manager wants to upgrade this system and use it to run a database application that will be used by 100 users. the database application and the associated data will take up over 200gb of hard disk space. in addition, these 100 users will store their personal files on the hard disk of the system. each user must have a maximum of 5gb of storage space. the department manager has made it very clear that this system must not exhibit any downtime as a result of hard disk errors. how much hard disk space will you require, and what partitions would you need to ensure that the system will perform as needed? where would these partitions be mounted? what quotas would you implement? what commands would you need to run and what entries to /etc/fstab would you need to create? justify your answers.
Answers: 3
question
Computers and Technology, 23.06.2019 04:31
Q14 what is most important for you to choose before you build a network? a. private network b. nos c. network media d. network protocol e. directory service
Answers: 1
You know the right answer?
Suppose Bob and Alice want to flip a coin over a network and decide who is the winner. Alice propose...
Questions
question
Mathematics, 03.02.2020 19:51
question
Mathematics, 03.02.2020 19:52
question
Mathematics, 03.02.2020 19:52
question
World Languages, 03.02.2020 19:52
Questions on the website: 13722362