Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chapter 5 SECURITY PROTOCOLS WITH CONVENTIONAL CRYPTOGRAPHY Exercises Two persons are responsible for correcting an exam on cryptography, none wants to do it, but one, and only one, has to do it. Thus, they want to decide who will correct the exam by flipping a coin. One person chooses "head" or "tail". The other person flips a coin, and the decision is made upon the face up. One problem is that one of them is traveling so they can only communicate remotely over some channel (e.g., Internet or telephone). In order to solve this problem, somebody proposes the following protocol. w Participant A chooses x ="headv or x ="tailn and picks a random key K. He encrypts x with DES by using K and obtains y. Participant A sends y to participant B. w Participant B flips a coin and tells which face is up to participant A. w Participant A reveals K Participant B decrypts y with DES by using K and obtains the bet of participant A. This person claims that it is impossible for participant A "to change his mind" due to the commitment y. 126 EXERCISE BOOK 1 By using a birthday-like attack, show that
Published: Jan 1, 2006
Keywords: Block Cipher; Security Protocol; Authentication Server; Ascii Character; Exercise Book
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.