This shows you the differences between two versions of the page.
sasc:laboratoare:04 [2017/03/16 14:26] marios.choudary |
sasc:laboratoare:04 [2017/03/16 16:21] (current) marios.choudary |
||
---|---|---|---|
Line 36: | Line 36: | ||
* c) Let $K_3 = \{0, 1\}^{n+1}$. Construct a new PRF $F_3 : K_3 \times X \to Y$ with the following property: the PRF $F_3$ is secure, however if the adversary learns the last bit of the key then the PRF is no longer secure. This shows that leaking even a single bit of the secret key can completely destroy the PRF security property. | * c) Let $K_3 = \{0, 1\}^{n+1}$. Construct a new PRF $F_3 : K_3 \times X \to Y$ with the following property: the PRF $F_3$ is secure, however if the adversary learns the last bit of the key then the PRF is no longer secure. This shows that leaking even a single bit of the secret key can completely destroy the PRF security property. | ||
<note tip> | <note tip> | ||
- | Hint: Let $k_3 = k \| b$ where $k \in \{0,1\}^{n}$ and $b \in \{0,1\}$. Set $F_3(k_3,x)$ to be the same as $F (k, x)$ for all $x \neq 0^{n}$. Define $F_3\left(k_3, 0^{n}\right)$ so that $F_3$ is a secure PRF, but becomes easily distinguishable from a random function if the last bit of the secret key $k_3$ is known to the adversary. Prove that your $F_3$ is a secure PRF by arguing the contra-positive, as in part (b). | + | Hint: Let $k_3 = k \| b$ where $k \in \{0,1\}^{n}$ and $b \in \{0,1\}$. Set $F_3(k_3,x)$ so that $F_3$ is a secure PRF, but becomes easily distinguishable from a random function if the last bit of the secret key $k_3$ is known to the adversary. Prove that your $F_3$ is a secure PRF by arguing the contra-positive, as in part (b). |
</note> | </note> | ||
- | * d) Construct a new PRF $F_4 : K_3 × X \to Y$ that remains secure if the attacker learns any single bit of the key. Your function $F_4$ may only call $F$ once. Briefly explain why your PRF remains secure if any single bit of the key is leaked. | ||
==== Exercise 3 (2p) ==== | ==== Exercise 3 (2p) ==== | ||
Line 53: | Line 52: | ||
We defined security of encryption scheme E against an eavesdropper in two ways: | We defined security of encryption scheme E against an eavesdropper in two ways: | ||
- | * $Pr[A(c_b)=b] \le negl(n)$ | + | * $Pr[A(c_b)=b] \le \frac{1}{2} + negl(n)$ |
- | * $|Pr[A(c_1)=1] - Pr[A(c_0)=1]| \le \frac{1}{2} + negl(n)$ | + | * $|Pr[A(c_1)=1] - Pr[A(c_0)=1]| \le negl(n)$ |
where $A(c_i) = j$ means that when the adversary receives the encryption of message $i$ he returns the bit $b'=j$. | where $A(c_i) = j$ means that when the adversary receives the encryption of message $i$ he returns the bit $b'=j$. |