question archive You have a software for an asymmetric encryption scheme AE = (K,E,D) that is known to be IND-CCA secure under some reasonable assumptions

You have a software for an asymmetric encryption scheme AE = (K,E,D) that is known to be IND-CCA secure under some reasonable assumptions

Subject:Computer SciencePrice:2.87 Bought7

You have a software for an asymmetric encryption scheme AE = (K,E,D) that is known to be IND-CCA secure under some reasonable assumptions. But the message space for this scheme is only the set of messages up to 1MB long. At some point you needed to encrypt messages of length more than 1MB but less than 2MB. So you decide to use the existing software from now on in the following way. To encrypt a message M, break it into equal parts M1, M2 (for simplicity let's assume that all messages have even length) and let a ciphertext be computed as Epk(M1)?Epk(M2), for any public key pk. Here ? denotes concatenation. The decryption algorithm de- crypts both halves of the ciphertext as M1 ← Dsk(C1), M2 ← Dsk(C2) and returns M1?M2 if neither decryption rejected. If either decryption rejects, then the output is rejection. Let's call the modified scheme AE′ = (K, E′, D′). Do you think AE′ is IND-CPA? IND-CCA? Justify your answers.

Option 1

Low Cost Option
Download this past answer in few clicks

2.87 USD

PURCHASE SOLUTION

Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

rated 5 stars

Purchased 7 times

Completion Status 100%