Course:Fall 2009 Exercises 2
From CRYPTUTOR
- Impossibility of information-theoretic public-key encryption.
- [15 pts] Show that no public-key encryption scheme can be secure against computationally unbounded adversaries. More concretely, show that if is a public-key encryption scheme with perfect correctness (i.e., for all messages M and valid key-pairs (PK,SK), we have ) then there is a function such that for all messages M and valid public-keys PK, (note that uses only the public-key and not the secret-key).
- [Extra Credit] (This problem uses information theoretic terminology.) Show an information theoretic statement that if Alice and Bob do not share private information, then whatever information Alice can convey to Bob using a public-key encryption scheme (which may or may not be perfectly correct), Eve gets the entire information. More precisely, show that for any probabilistic algorithms and , I(PK,C;M) = I(PK,SK,C;M) where and and M comes from an arbitrary distribution. I(X;Y) denotes the mutual information between the random variables X and Y.
- Pitfalls in fiddling with CCA secure schemes. To protect against packet corruptions while transmission, suppose one uses an "enhanced" encryption scheme , derived from an encryption scheme as follows. The ciphertext in the enhanced scheme consists of three ciphertexts independently generated as encryptions of the plaintext under the original scheme. i.e., , where . For decryption, the three ciphertexts are decrypted. If at least two of the ciphertexts decrypt to the same message, that message is output as the decryption. Otherwise an error message is produced.
- [10 pts] Show that is IND-CPA secure, if is.
- [10 pts] Show that is not IND-CCA secure, even if is.
- Preimage collision resistance and second-preimage collision resistance are incomparable. In this problem we consider hash functions on a finite domain (from {0,1}^{n(k)} to {0,1}^{k}).
- [10 pts] Suppose is preimage collision resistant. Modify to (possibly with a different domain), so that the latter remains preimage collision resistant, but is not second-preimage collision resistant. (Prove these properties of .)
- [10 pts] Given a CRHF which compresses by two bits (say from n bits to n − 2 bits), construct a CRHF that compresses by one bit (say from n + 1 bits to n bits), such that the function f(h',x) = (h',h'(x)) (where ) is not a OWF. (In both and , collision-resistance holds when the hash function is drawn uniformly at random from the family.)
- [Extra Credit] (Sufficiently Shrinking) CRHF implies OWF. Below we say that "x has a collision under f" if there exists an such that f(x) = f(x').
- Let be a CRHF and suppose that for every and every x, x has a collision under h. Show that the function f(h,x) = (h,h(x)) is a OWF.
- Now suppose that for each , all but a negligible fraction of x's have a collision under h. Show that the function f(h,x) = (h,h(x)) is a OWF.
- Show that if is a CRHF from n bits to n / 2 bits, then the function f(h,x) = (h,h(x)) is a OWF.
- [15 pts] Compare the security of HMAC with a simpler construction that appends the secret key to the data being authenticated. I.e., MAC_{K}(x) = H(x | | K). Describe an attack on the simpler construction that the HMAC construction prevents.
- The Needham-Schroeder Public Key protocol uses a trusted server, S, to help two parties exchange secret keys with each other. A priori, there are no secrecy or authentication guarantees on the communication network, and the parties know only each other's identities and a public key of the server S. The server, S, knows public keys of all the users. The goal of the protocol is that at the end A and B should agree on random nonces N_{A} and N_{B} (chosen by A and B respectively). The protocol is described at the end.
- [10 pts] There is a (famous) man-in-the-middle attack on this protocol, whereby a party in the system can set up a shared key with B, while she thinks she has shared that key with A. Describe such an attack (without looking it up!). [Hint: The adversary can run a concurrent session with A. It is similar to an attack described in the lecture.]
- [10 pts] Suggest a (small) fix for the attack.
- [10 pts] If you were designing this protocol today, using public-key encryption and signatures, how would you do it?
- [Extra Credit] How will you define the security guarantee of the scheme you design? Can you prove that your scheme indeed meets the security definition?
Needham-Schroeder (Public Key) Protocol: The protocol is described in terms of a public key encryption algorithm E. It is a deterministic encryption scheme with the property that . If M is sufficiently random, is assumed to behave like a signature on M (though it does not give existential unforgeability). PA,PB are Alice and Bob's public keys and SA,SB are their secret keys, respectively. Likewise, the server's public and secret keys are PS,SS.
* (A sends the identities to S) * (S sends B's public key to A) * (where N_{A} is a fresh nonce, picked by A) * (B sends the identities to S) * (S sends A's public key to B) * (where N_{B} is a fresh nonce picked by B) * (A and B agree on N_{A},N_{B} at this point)