Rivest Problem Set 4 Solutions
نویسنده
چکیده
(a) Groups wrote implementations of Paillier in C, C++, Java, and Python. The shortest implementation was in Python; the second shortest was in C++ using the NTL large number library. (b) Groups were awarded 5 points for a correct decryption and 5 points for a correct encryption. Many students asked how the number to be decrypted was chosen. The number was simply a randomly-generated 10 digit number. We graded the problem by doing quick scan through the log file to verify that the number you reported was given to someone in your group. The PINs were to prevent one group of students from sabotaging another student’s results. Luckily that didn’t happen, so we didn’t need to use them. (c) There are two security flaws with Ben’s idea. The first is that a person could vote more than once. However, on the night before the problem set was due, we sent out email saying that this flaw would be handled by standard voter registration techniques. The second flaw — the one we were looking for — is that a person can stuff the ballot box with a single vote by submitting a ciphertext for an m > 1. In fact, a person could even take away votes by voting with a negative m, which would be an m that is somewhat less than n; that is, if Ben wanted to remove 10 votes, he could vote with m = n− 10. A third flaw is that the scheme does not protect the votes of voters, since the agency is able to decrypt any individual voter’s vote at any time. You need to trust the agency. One group of students suggested an active attack: if you are in favor of the resolution, multiply each ciphertext by g, and if you are opposed multiply each ciphertext by g−1. That’s a lot of work; you could just multiply a single ciphertext by g to add 500 votes to the resolution. It was incorrect to state that there were only two valid ciphertexts, allowing an attacker to create a dictionary of possible ciphertexts. That’s the whole point of a randomized cryptosystem — involving the random value r in the calculation of each ciphertext prevents this kind of attack. Grading policy: 5 points for working code, 5 points for a valid encryption, 5 points for a valid decryption, and 5 points for identifying a valid flaw.
منابع مشابه
Rivest Problem Set 2 Solutions Problem 1 - 1 . One - Time Pads
0 ≤ xi ⊕ yi < 16 for all individual bytes i ∈ [0, 191]. Therefore, by taking two encoded messages x′ = x ⊕ p and y′ = y⊕ q and XORing them together, we get x′⊕ y′ = (x⊕ y)⊕ (p⊕ q), which in turn equals x⊕ y if they used the same pad p = q. So, if all bits of x′ ⊕ y′ are less than 16, we can be reasonably certain that the same OTP was used; otherwise, we can be fully certain that different OTPs ...
متن کاملCharacterization of efficient points of the production possibility set under variable returns to scale in DEA
We suggest a method for finding the non-dominated points of the production possibility set (PPS) with variable returns to scale (VRS) technology in data envelopment analysis (DEA). We present a multiobjective linear programming (MOLP) problem whose feasible region is the same as the PPS under variable returns to scale for generating non-dominated points. We demonstrate that Pareto solutions o...
متن کاملWell-dispersed subsets of non-dominated solutions for MOMILP problem
This paper uses the weighted L$_1-$norm to propose an algorithm for finding a well-dispersed subset of non-dominated solutions of multiple objective mixed integer linear programming problem. When all variables are integer it finds the whole set of efficient solutions. In each iteration of the proposed method only a mixed integer linear programming problem is solved and its optimal solutions gen...
متن کاملLearning Action Strategies for Planning Domains Learning Action Strategies for Planning Domains
This paper reports on experiments where techniques of supervised machine learning are applied to the problem of planning. The input to the learning algorithm is composed of a description of a planning domain, planning problems in this domain, and solutions for them. The output is an eecient algorithm | a strategy | for solving problems in that domain. We test the strategy on an independent set ...
متن کاملAnalysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range
The Chor-Rivest cryptosystem, based on a high-density knapsack problem on a finite field Fqh , was broken by S. Vaudenay for q ≈ 200, h ≈ 24, and h admitting a factor s verifying a certain condition. A new set of parameters q and h, which prevent this cryptosystem against Vaudenay’s attack, is presented and the computational aspects of its implementation in the Magma computational algebra syste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003