subject

Suppose Bob and Alice want to flip a coin over a network and decide who is the winner. Alice proposes the following protocol.

(i) Alice randomly selects a value X in {0,1} (i. e., either 0 or 1).
(ii) Alice generates a 256-bit random symmetric key K.
(iii) Using the AES cipher, Alice computes Y = E(X, R,K), where R consists of 255 randomly selected bits.
(iv) Alice sends Y to Bob.
(v) Bob guesses a value Z £ {0,1} and tells Alice.
(vi) Alice gives the key K to Bob who computes (X, R) = D(Y, K).
(vii) If X = Z then Bob wins, otherwise Alice wins.

This protocol is insecure.

a. Explain how Alice can cheat.
b. Using a cryptographic hash function h, modify this protocol so that Alice cannot cheat.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 12:30
Animations and transitions are added from the
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
What is the total resistance in a circuit that contains three 60 ohm resistors connected in a series? a. 20 ohms b. 120 ohms c. 60 ohms d. 180 ohms
Answers: 2
question
Computers and Technology, 23.06.2019 18:40
How does is make you feel when you're kind to others? what are some opportunities in your life to be more kind to your friends and loved ones? imagine a world where kindness has be outlawed. how would people act differently? would your day-to-day life change significantly? why or why not?
Answers: 2
question
Computers and Technology, 24.06.2019 03:00
Will do anything for brainlest so can you guys me out i will try my best to you out
Answers: 1
You know the right answer?
Suppose Bob and Alice want to flip a coin over a network and decide who is the winner. Alice propose...
Questions