2024 CS783 Mid Term
2024 CS783 Mid Term
Mid-Term Exam
September 19, 2024
Full marks: 40, Time: 2 hours
Instructor: Chethan Kamath
1. Please enter your roll number and name in the answer booklet.
2. There are eight problems. Answer problems 1-2 in the same page of the answer
booklet and use separate pages for the rest.
3. Problems 1-2 are all or nothing: you get the full marks only if your answer is the
exact subset. If you think the correct answers are 1 and 3, just write “1, 3”
Dec(c =: (c1 , c2 ), k) := c1 ⊕ k
2. Π is perfectly secure
3. Π is perfectly secure even when the eavesdropper is given the coins r used to encrypt
4. Π becomes insecure when the eavesdropper is given the coins r used to encrypt
Given below are four hash functions H′ defined using H with Gen′ := Gen. Select the
collision resistant one(s).
1. Hash-then-flip: H′ (k, x) := H(k, x) ⊕ 1n
Problem 3 (4 marks). Consider the message authentication code (Gen, Tag, Ver) con-
structed below using a pseudo-random function (PRF) {F : {0, 1}n × {0, 1}n → {0, 1}n }.
Note that the message space is {0, 1}2n . Describe an attack that shows the scheme is not
EU-CMA secure. (Hint: you need to query the tag oracle twice.)
Problem 4 (4 marks). Let f = {fn : {0, 1}n → {0, 1}n } be any one-way permutation
(OWP). For n := |x|, consider the n-time self-composition of f
Is f ′ = {fn′ : {0, 1}n → {0, 1}n } always a OWP? Come up either with
a brief security proof that f ′ is a OWP (describe your reduction in full detail, and
then briefly analyse why it works).
Problem 5 (4 marks). Let {F : {0, 1}n × {0, 1}n → {0, 1}n } be any PRF. Consider the
following construction of pseudo-random generator (PRG) G using F:
i.e., evaluate the seed s on fixed keys 1, . . . , |s|. Note that G expands its seed s to |s|2
bits. Is G always a PRG? Come up either with
a brief security proof that G is a PRG (describe your reduction in full detail, and
then briefly analyse why it works).
Problem 6 (2+3=5 marks). You are given a public-key encryption scheme Σ = (Gen, Enc, Dec)
that is IND-CPA-secure. Using Σ, construct a two-message (i.e., one-round) key-exchange
protocol Π.
Problem 7 (3+3=6 marks). You are given a one-time EU-CMA-secure digital signature
scheme Σ = (Gen, Sign, Ver) that can sign one-bit messages. Using Σ, construct a one-way
function f.
Construction 1. H′ (k, x)
Output yℓ(n)
1. Design an H such that H′ is not collision-resistant when used with inputs over the
domain {0, 1}≤ℓ(n) , i.e., strings of length at most ℓ(n). Write down your collision
(which must be of different length).
2. Describe a fix for Construction 1 so that it works for {0, 1}∗ . (Hint: you need to
pad your input appropriately.)