Assignment 1
Assignment 1
Assignment 1
Instructor: Chethan Kamath
Exercise 1 (Classical ciphers [KL14]). Let’s understand the conditions under which some
of the classical ciphers we discussed in Lecture 2 become perfectly secure.
1. Show that (monoalphabetic) shift cipher is perfectly secure for messages of length
one, i.e., message-space {a, · · · , z}.
is negligible (as defined in Lecture 3). Since we allow a slack, this is a weaker requirement
than perfect secrecy. Does Shannon’s impossibility still extend to statistically-secret SKE
schemes?
Exercise 3 (One-time pad (OTP)). Recall the definition of OTP from Lecture 2.
1. The goal of this exercise is to help you understand more about randomness in en-
cryption algorithm. Recall that the encryption algorithm of OTP is deterministic.
Modify OTP to come up with two perfectly-secure SKE schemes P S1 and P S2 that
have randomised encryption algorithm, and such that leaking the random coins used
in encryption leads (a) P S1 to become insecure (b) P S2 to remain secure.
2. Let’s consider OTP against a tampering adversary Tam who can modify a cipher-
text c of some message m = m0 · · · mℓ−1 ∈ {0, 1}ℓ before it reaches the recipient,
Caeser’s general. Can Tam tamper c to some ciphertext c′ such that Caeser’s gen-
eral decrypts c′ to the following. If your answer is ‘yes’, then describe Tam; if it is
‘no’, justify.
3. Suppose an OTP key is used to encrypt two messages m0 and m1 of your choice.
Is it possible to recover the key with certainty?
1. Are fp and fM negligible, and why? Here, a Mersenne prime is a prime of the form
Mn := 2n − 1. (
1/n314159 if n is a prime
fp (n) :=
1/2n otherwise
(
1/n314159 if Mn is a Mersenne prime
fM (n) :=
1/nlog(n) otherwise
2. If ν1 and ν2 are negligible function, which of these following functions are also
(always) negligible? In case the function is negligible, provide a security reduction;
in case not, provide a counter-example.
1. Let G be a PRG that stretches from n bits to n + 1 bits. Which of the following can-
didates based on G are also (always) PRGs? In case your claim is that a candidate
is a PRG, provide a proof; in case not, provide a counter-example and the efficient
distinguisher.
References
[KL14] Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography (3rd ed.). Chapman
and Hall/CRC, 2014.