Differences

This shows you the differences between two versions of the page.

Link to this comparison view

ic:laboratoare:04 [2020/10/27 18:42]
acosmin.maria
ic:laboratoare:04 [2020/11/02 01:08] (current)
acosmin.maria
Line 77: Line 77:
   * d) Construct a new PRF $F_4 : K × X \to Y$ that remains secure if the attacker learns any single bit of the key. Your function $F_4$ may only call $F$ once. Briefly explain why your PRF remains secure if any single bit of the key is leaked.   * d) Construct a new PRF $F_4 : K × X \to Y$ that remains secure if the attacker learns any single bit of the key. Your function $F_4$ may only call $F$ once. Briefly explain why your PRF remains secure if any single bit of the key is leaked.
  
-==== Exercise 2 ====+==== Exercise 2-3-4 ====
  
 Let's analyse some substitution-permutation networks (SPN). Let's analyse some substitution-permutation networks (SPN).
  
-=== SPN 1 (3p) ===+==== SPN 1 (3p) ====
  
 We have the SPN from this figure: We have the SPN from this figure:
ic/laboratoare/04.1603816957.txt.gz · Last modified: 2020/10/27 18:42 by acosmin.maria
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0