Question

Describe how an attacker can obtain the one-time pad that is used to encrypt a message,...

  1. Describe how an attacker can obtain the one-time pad that is used to encrypt a message, given both the message and the ciphertext, and explain why your method works.
  2. Suppose that two equal-sized messages M1 and M2 are encrypted with the same one-time pad and let C1 and C2 be the resulting ciphertexts. Suppose further that an attacker captures both ciphertexts C1 and C2, and knows one of the two messages, say M1. Based on Part a), describe how the attacker can obtain the other message M2, and explain why your method works.
  3. Let’s think about a more realistic situation than part b) that the attacker captures both ciphertexts C1 and C2, but does not know message M1. Based on part b), can you provide an example showing that the attacker can still obtain the message M2 ? You can do research online and find approaches. By answering this question, you can have an idea on how an attacker can do in practice and why the one-time pad cannot be used more than once.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Remarks:Add 26 to 2 for C.(Written wrong D).

(c).

The attacker can get M2 without knowing M1. This is called man in the middle attack. Suppose there are two people Bob and Alice. Bob sends message to Alice and the man in the middle(attacker) is trudy. Suppose Bob and alice has common terms g,n and their secret keys are x and y respectively. and trudy also have his secret key z.

1.Bob sends R1,g,n to Alice. (R1=gxmod n).R1 is the encypted message.

2. Trudy gets it and he forms his message Rz=gzmod n. and sends Rz,g,n to Alice.

3. Alice message is R2=gymod n. So she forms Rzymod n as the key. i.e. gxzmod n. and sends R2 to Bob. but trudy gets it and he keep the secret key of Alice as Ktb=gyzmod n.

4.Trudy keeps Kta as Bob's secret.Kta= gxzmod n and sends Rz to Bob.

5. Bob forms the key Rzx mod n=gxzmod n .

So trudy is successfull in giving his own key to both Bob and Alice and hence can decrypt every message thereafter.

Add a comment
Know the answer?
Add Answer to:
Describe how an attacker can obtain the one-time pad that is used to encrypt a message,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • To encrypt 3 KB of plain-text using a One Time Pad encryption algorithm, how long a...

    To encrypt 3 KB of plain-text using a One Time Pad encryption algorithm, how long a truly random key would be required?

  • the w 2. This problem explores the use of a one-time pad version of t In...

    the w 2. This problem explores the use of a one-time pad version of t In this scheme, the key is a stream of random numbers between 0 and example, if the key is 3 19 5..., then the first letter of plaintext is encrypted with a shift of 3 letters, the second with a shift of 19 letters, the third with a shift of 5 letters, and so on. a. Encrypt the plaintext sendmoremoney with the key stream 9...

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

  • In Problem Set 7 you designed and implemented a Message class. This time, let's design and...

    In Problem Set 7 you designed and implemented a Message class. This time, let's design and implement a Mailbox class in a file named Mailbox java. Do the following with this class • You may use the Message class from PS 7. You will have to add new features to the Message class from PS 7 as you work through this problem. You are welcome to start with my sample solution if you wish • Suppose there are multiple mail...

  • Question C1. Give two (2) ways in which you can increase the yield strength of a metal and briefly explain how each...

    Question C1. Give two (2) ways in which you can increase the yield strength of a metal and briefly explain how each works to increase the yield stress. Question C2. An aluminium-Silicon casting alloy has a composition that is close to the Al-Si eutectic composition. Give two reasons why this composition is used to cast aluminium based engine blocks Question C3. Describe briefly three (3) mechanisms by which short randomly aligned fibres add to the toughness of a composite. can...

  • How can help me to create this program? PartADriver public class PartADriver {    public static...

    How can help me to create this program? PartADriver public class PartADriver {    public static void main (String [] args)    { // create two martians Martian m1 = new Martian(); Martian m2 = new Martian("Grey", 3); // display both martians Output.showMessage("After instantiation.\n" + "Martian #1: " + m1.toString() + "\nMartian #2: " + m2.toString()); // make the first martian speak 3 times for (int count = 0; count < 3; count++)    m1.speak(); // make the second martian...

  • C++ please Programming Assignment #6 Help Me Find The Secret Message Description: This assignment will require...

    C++ please Programming Assignment #6 Help Me Find The Secret Message Description: This assignment will require that you read in an encrypted message from a file, decode the message, and then output the message to a file. The encryption method being used on the file is called a shift cipher (Info Here). I will provide you with a sample encrypted message, the offset, and the decrypted message for testing. For this project I will provide you main.cpp, ShiftCipher.h, and ShiftCipher.cpp....

  • Cryptography, the study of secret writing, has been around for a very long time, from simplistic...

    Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form however, there are some underlying things that must be done – encrypt the message and decrypt the encoded message. One of the earliest and simplest methods ever used to encrypt and decrypt messages is called the Caesar cipher method, used by Julius Caesar during the Gallic war. According to this method, letters of the...

  • JAVA PROJECT Part 1 - Normalize Text The first thing we will do is normalize the...

    JAVA PROJECT Part 1 - Normalize Text The first thing we will do is normalize the input message so that it’s easier to work with. Write a method called normalizeText which does the following: Removes all the spaces from your text Remove any punctuation (. , : ; ’ ” ! ? ( ) ) Turn all lower-case letters into upper-case letters Return the result. The call normalizeText(“This is some \“really\” great. (Text)!?”) should return “THISISSOMEREALLYGREATTEXT” Part 2 - Obfuscation...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT