Scroll Top
19th Ave New York, NY 95822, USA

数学代写|CS346 Cryptography

MY-ASSIGNMENTEXPERT™可以为您提供 utexas.edu CS167 Cryptography密码学的代写代考辅导服务!

这是德克萨斯州大学奥斯汀分校密码学课程的代写成功案例。

CS346课程简介

This course provides an introduction to modern cryptography. Topics include symmetric cryptography, public-key cryptography, digital signatures, key agreement, and zero-knowledge proofs. We will also cover proper usage of cryptographic primitives.

Location: RLP 1.104
Time: Tuesday, Thursday, 2:00pm-3:30pm

The default delivery of this course is in person. Recordings of the lectures will be available via Lectures Online. If you are not able to make it to lecture or are feeling unwell, please watch the recordings offline.

Prerequisites 

Canvas: We will use Canvas, which includes links to Ed Discussion (for announcements and class discussions and Gradescope for assignment submission and grading.

Ed Discussion: We will use Ed Discussion for class discussions and for sending out course announcements. If you have a question about the course material or course logistics, please post it on Ed Discussion instead of emailing the course staff directly. You should be automatically added to the Ed Discussion site via Canvas once the semester starts.

Lectures Online: Recordings of the lectures will be available via Lectures Online after the lecture (if available). You can also access Lectures Online via Canvas.

Gradescope: Homework submissions will be handled via Gradescope. You should be automatically enrolled in the course via Canvas once the semester starts.

Homework: Please see the Course Organization and Policies page for details on how to format and submit your homeworks as well as the collaboration policy for the course.

CS346 Cryptography HELP(EXAM HELP, ONLINE TUTOR)

问题 1.

Exercise 1 (30 points). Consider the following identification problem: there’s a “box” that controls access to some resource (e.g., a door) and authorized people are given some secret information that enables them to use the resource, but unauthorized people cannot do so, even if the know the contents of the box.

  1. Consider the weakest security definition of this problem where the only attack we’re considering is an adversary that “listens in” on conversations between honest users and the box). Construct a non-interactive (i.e., a protocol consisting of a single message from the user to the box) protocol solving the identification problem and prove its security.
  2. Construct a non-interactive identification protocol that remains secure under the stronger attack where an adversary may open up the box and see the data it contains, listen in on other conversations and also construct “fake boxes” and have the authorized people talk to these fake bozes. Prove the security for your protocol. You may assume that all parties have access to a perfectly synchronized global clock.

问题 2.

Exercise 2 (Non malleability of CCA secure schemes – 30 points). An attractive way to perform a bidding is the following: the seller publishes a public key $e$. Each buyer sends through the net the encryption $\mathrm{E}_e(x)$ of its bid, and then the seller will decrypt all of these and award the product to the highest bidder.

One aspect of security we need from $\mathrm{E}(\cdot)$ is that given an encryption $\mathrm{E}_e(x)$, it will be hard for someone not knowing $x$ to come up with $\mathrm{E}_e(x+1)$ (otherwise bidder $\mathrm{B}$ could always take the bid of bidder A and make into a bid that is one dollar higher). You’ll show that this property is also related to CCA security:

  1. Show a CPA-secure public key encryption such that there is an algorithm that given $e$ and a ciphertext $y=\mathrm{E}_e(x)$, converts $y$ into a ciphertext $y^{\prime}$ that decrypts to $x+1$. (If it makes your life easier, you can make the algorithm work only if $x$ is, say, a multiple of 100.)
  2. Show that if $E$ is CCA secure then there is no such algorithm. In particular show that if $M$ is any polynomial time algorithm, and $X$ is a set of possible numbers $x$, then
    $$
    \underset{(e, d) \leftarrow \operatorname{Gen}^{\left(1^n\right)}}{ }\left[\mathrm{D}_d\left(M\left(e, \mathrm{E}_e(x)\right)\right)=x+1\right]<\frac{1}{|X|}+n^{-\omega(1)}
    $$

问题 3.

Exercise 3 (Authenticated key exchange – 60 points). Consider a key exchange protocol where the client has the public keys of a server, chooses a key $k \leftarrow_{\mathrm{R}}{0,1}^n$ for a private key scheme, interacts with the server, and at the end decides whether or not to accept the key as valid. For simplicity we restrict ourselves to two-message protocols (one message from client to server and one message from server to client). Consider the following attack on such protocols:

  • Client sends the first message to the adversary.
  • Adversary gets a polynomial number of interactions with the server.
  • Adversary sends a message to the client.
  • The client chooses $b \leftarrow_{\mathrm{R}}{1,2}$. If it accepts the message and obtained a key $k$ and $b=1$ then it sends $k$ to the adversary. Otherwise, (either $b=2$ or it did not accept the message) it sends a random string $k^{\prime} \leftarrow_{\mathrm{R}}{0,1}^n$ to the adversary.
  • The adversary outputs $b^{\prime} \in{1,2}$. We say the adversary is successful if $b^{\prime}=b$.
    We say the protocol is secure if the probability the adversary succeeds in this attack is at most $\frac{1}{2}+n^{-\omega(1)}$.

For each of the following protocols, either prove that it is secure or give an example showing it is insecure. Notation: We denote by (Sign, Ver) a secure signature scheme. We denote by Eub,cca a CCA secure public key encryption scheme, by $E^{\text {pub.cpa }}$ a CPA secure public key encryption scheme, and by $E^{\text {priv,cpa }}$ a CPA secure private key encryption scheme. The protocol is secure if it is secure for any suitable choice of the underlying schemes. In all cases we denote by $e$ and by $v$ the public encryption key and verification key of the server, and assume that the client knows them.

数学代写|CS346 Cryptography

MY-ASSIGNMENTEXPERT™可以为您提供 UTEXAS.EDU CS167 CRYPTOGRAPHY密码学的代写代考和辅导服务!

Related Posts

Leave a comment