question
stringlengths
6
3.53k
text
stringlengths
17
2.05k
source
stringclasses
1 value
The number of plaintext/ciphertext pairs required for a differential cryptanalysis is\dots
The most powerful form of the attack requires 250 known plaintexts, has a computational complexity of 250, and has a 51% success rate.There have also been attacks proposed against reduced-round versions of the cipher, that is, versions of DES with fewer than 16 rounds. Such analysis gives an insight into how many round...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
The number of plaintext/ciphertext pairs required for a differential cryptanalysis is\dots
Unlike other forms of cryptanalysis, such as differential and linear cryptanalysis, only one or two known plaintexts are required. The XSL algorithm is tailored to solve the type of equation systems that are produced. Courtois and Pieprzyk estimate that an "optimistic evaluation shows that the XSL attack might be able ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Given the distribution $P_0$ of a normal coin, i.e. $P_0(0)=P_0(1)=\frac{1}{2}$, and distribution $P_1$ of a biased coin, where $P_1(0)=\frac{1}{3}$ and $P_1(1) = \frac{2}{3}$ , the maximal advantage of a distinguisher using a single sample is\dots
{\displaystyle n\geq {\frac {1}{2\varepsilon ^{2}}}\log \left({\frac {1}{2\delta }}\right).} In order to obtain this lower bound we impose that the total variation distance between two sequences of n {\displaystyle n} samples is at least 1 − 2 δ {\displaystyle 1-2\delta } . This is because the total variation upper bou...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Given the distribution $P_0$ of a normal coin, i.e. $P_0(0)=P_0(1)=\frac{1}{2}$, and distribution $P_1$ of a biased coin, where $P_1(0)=\frac{1}{3}$ and $P_1(1) = \frac{2}{3}$ , the maximal advantage of a distinguisher using a single sample is\dots
Assume two biased coins, the first with probability p of turning up heads and the second with probability q > p of turning up heads. Intuitively, if both coins are tossed the same number of times, we should expect the first coin turns up fewer heads than the second one. More specifically, for any fixed k, the probabili...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
To how many plaintexts we expect to decrypt a ciphertext in the Rabin cryptosystem when we don't use redundancy?
It has been proven that any algorithm which finds one of the possible plaintexts for every Rabin-encrypted ciphertext can be used to factor the modulus n {\displaystyle n} . Thus, Rabin decryption for random plaintext is at least as hard as the integer factorization problem, something that has not been proven for RSA. ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
To how many plaintexts we expect to decrypt a ciphertext in the Rabin cryptosystem when we don't use redundancy?
Decrypting produces three false results in addition to the correct one, so that the correct result must be guessed. This is the major disadvantage of the Rabin cryptosystem and one of the factors which have prevented it from finding widespread practical use. If the plaintext is intended to represent a text message, gue...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
For an interactive proof system, the difference between perfect, statistical and computational zero-knowledge is based on \ldots
A formal definition of zero-knowledge has to use some computational model, the most common one being that of a Turing machine. Let P {\displaystyle P} , V {\displaystyle V} , and S {\displaystyle S} be Turing machines. An interactive proof system with ( P , V ) {\displaystyle (P,V)} for a language L {\displaystyle L} i...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
For an interactive proof system, the difference between perfect, statistical and computational zero-knowledge is based on \ldots
This is formalized by showing that every verifier has some simulator that, given only the statement to be proved (and no access to the prover), can produce a transcript that "looks like" an interaction between an honest prover and the verifier in question.The first two of these are properties of more general interactiv...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
What is the name of the encryption threat that corresponds to \emph{force the sender to encrypt some messages selected by the adversary}?
Deniable encryption allows the sender of an encrypted message to deny sending that message. This requires a trusted third party. A possible scenario works like this: Bob suspects his wife Alice is engaged in adultery.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
What is the name of the encryption threat that corresponds to \emph{force the sender to encrypt some messages selected by the adversary}?
Computer security Opportunistic encryption Communications security Secure messaging
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $C$ be a perfect cipher with $\ell$-bit blocks. Then, \dots
Let P = P ‖ P ‖ P ‖ P {\displaystyle P=P\|P\|P\|P} be a 128-bit block of plaintext and C = C ‖ C ‖ C ‖ C {\displaystyle C=C\|C\|C\|C} be a 128-bit block of ciphertext, where P {\displaystyle P} and C {\displaystyle C} ( 0 ≤ i < 4 {\displaystyle 0\leq i<4} ) are 32-bit blocks. Let K i = K i ‖ K i ‖ K i ‖ K ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $C$ be a perfect cipher with $\ell$-bit blocks. Then, \dots
A notable property of the Davies–Meyer construction is that even if the underlying block cipher is totally secure, it is possible to compute fixed points for the construction: for any m {\displaystyle m} , one can find a value of h {\displaystyle h} such that E m ( h ) ⊕ h = h {\displaystyle E_{m}(h)\oplus h=h}: one ju...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
The exponent of the group $\mathbb{Z}_9^*$ is
R , C , H , O {\displaystyle \mathbb {R,C,H,O} } stand for the real numbers, complex numbers, quaternions, and octonions. In the symbols such as E6−26 for the exceptional groups, the exponent −26 is the signature of an invariant symmetric bilinear form that is negative definite on the maximal compact subgroup. It is eq...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
The exponent of the group $\mathbb{Z}_9^*$ is
Fix a prime p {\displaystyle p} and suppose the exponents e i {\displaystyle e_{i}} of the cyclic factors of the Sylow p {\displaystyle p} -subgroup are arranged in increasing order: e 1 ≤ e 2 ≤ ⋯ ≤ e n {\displaystyle e_{1}\leq e_{2}\leq \cdots \leq e_{n}} for some n > 0 {\displaystyle n>0} . One needs to find the auto...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{incorrect} statement. When $x\rightarrow+\infty$ \ldots
Set subtraction on the right, and parentheses on the left
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{incorrect} statement. When $x\rightarrow+\infty$ \ldots
Squeeze { '__'e.1 = ; s.A e.1 = s.A ; = ; };
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In order to avoid the Bleichenbacher attack in ElGamal signatures, \ldots
A polynomial-time attack, for Ω ( n ) {\displaystyle \Omega (n)} concurrent executions, was shown in 2020 by Benhamouda, Lepoint, Raykova, and Orrù. Schnorr also suggested enhancements for securing blind signatures schemes based on discrete logarithm problem. == References ==
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In order to avoid the Bleichenbacher attack in ElGamal signatures, \ldots
Signature algorithms like ElGamal and DSA have parameters which must be set with random information. He shows how one can make use of these parameters to send a message subliminally.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{incorrect} assumption. A language $L$ is in NP if\dots
"LR parsers for natural languages" (PDF). COLING.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{incorrect} assumption. A language $L$ is in NP if\dots
. In particular, if v i = ∑ j = 1 d i v i j e i j {\displaystyle {\textbf {v}}_{i}=\sum _{j=1}^{d_{i}}v_{ij}{\textbf {e}}_{ij}\!}
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In which of the following groups is the decisional Diffie-Hellman problem (DDH) believed to be hard?
The decisional Diffie–Hellman (DDH) assumption is a computational hardness assumption about a certain problem involving discrete logarithms in cyclic groups. It is used as the basis to prove the security of many cryptographic protocols, most notably the ElGamal and Cramer–Shoup cryptosystems.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In which of the following groups is the decisional Diffie-Hellman problem (DDH) believed to be hard?
The CDH assumption is a weaker assumption than the Decisional Diffie–Hellman assumption (DDH assumption). If computing g a b {\displaystyle g^{ab}} from ( g , g a , g b ) {\displaystyle (g,g^{a},g^{b})} was easy (CDH problem), then one could solve the DDH problem trivially. Many cryptographic schemes that are construct...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In ElGamal signature scheme and over the random choice of the public parameters in the random oracle model (provided that the DLP is hard), existential forgery is \ldots
When A attempts to forge on a message m, we consider the output of A to be (J, y) where y is the forgery, and J is such that m was the Jth unique query to the random oracle (it may be assumed that A will query m at some point, if A is to be successful with non-negligible probability). (If A outputs an incorrect forgery...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In ElGamal signature scheme and over the random choice of the public parameters in the random oracle model (provided that the DLP is hard), existential forgery is \ldots
This notion is a stronger (more secure) variant of the existential forgery detailed above. Weak existential forgery is the creation (by an adversary) of at least one message/signature pair, ( m , σ ′ ) {\displaystyle \left(m,\sigma '\right)} , given a message and different signature ( m , σ ) {\displaystyle (m,\sigma )...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which of the following primitives \textit{cannot} be instantiated with a cryptographic hash function?
Basic general information about the cryptographic hash functions: year, designer, references, etc.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which of the following primitives \textit{cannot} be instantiated with a cryptographic hash function?
Selected schemes for the purpose of hashing: SWIFFT. Lattice Based Hash Function (LASH).
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In plain ElGamal Encryption scheme \ldots
For the ElGamal encryption we suppose now that Alice is the owner of the XTR public key data ( p , q , T r ( g ) ) {\displaystyle (p,q,Tr(g))} and that she has selected a secret integer k {\displaystyle k} , computed T r ( g k ) {\displaystyle Tr(g^{k})} and published the result. Given Alice's XTR public key data ( p ,...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
In plain ElGamal Encryption scheme \ldots
Thus, the scheme serves mainly as a proof of concept, and more efficient provably-secure schemes such as ElGamal have been developed since. Because encryption is performed using a probabilistic algorithm, a given plaintext may produce very different ciphertexts each time it is encrypted. This has significant advantages...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. Let $X$ be a random variable defined by the visible face showing up when throwing a dice. Its expected value $E(X)$ is:
Let X {\displaystyle X} represent the outcome of a roll of a fair six-sided die. More specifically, X {\displaystyle X} will be the number of pips showing on the top face of the die after the toss. The possible values for X {\displaystyle X} are 1, 2, 3, 4, 5, and 6, all of which are equally likely with a probability o...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. Let $X$ be a random variable defined by the visible face showing up when throwing a dice. Its expected value $E(X)$ is:
The expected value or mean of a random vector X {\displaystyle \mathbf {X} } is a fixed vector E ⁡ {\displaystyle \operatorname {E} } whose elements are the expected values of the respective random variables. : p.333
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Consider an arbitrary cipher $C$ and a uniformly distributed random permutation $C^*$ on $\{0,1\}^n$. Tick the \textbf{false} assertion.
The idealized abstraction of a (keyed) block cipher is a truly random permutation on the mappings between plaintext and ciphertext. If a distinguishing algorithm exists that achieves significant advantage with less effort than specified by the block cipher's security parameter (this usually means the effort required sh...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Consider an arbitrary cipher $C$ and a uniformly distributed random permutation $C^*$ on $\{0,1\}^n$. Tick the \textbf{false} assertion.
Attacks that allow distinguishing ciphertext from random data.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textit{incorrect} assertion. Let $P, V$ be an interactive system for a language $L\in \mathcal{NP}$.
{\displaystyle z/y=x.} When the operations are expressed in this way, provability of a given sentence can be encoded as an arithmetic sentence describing termination of an analytic tableau. Provability of consistency can then simply be added as an axiom. The resulting system can be proven consistent by means of a relat...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textit{incorrect} assertion. Let $P, V$ be an interactive system for a language $L\in \mathcal{NP}$.
A formal theory using the " ⊥ {\displaystyle \bot } " connective is defined to be consistent, if and only if the false is not among its theorems. In the absence of propositional constants, some substitutes (such as the ones described above) may be used instead to define consistency.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the assertion related to an open problem.
Possible open issues. While there are unclear or open issues, those can be visible.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the assertion related to an open problem.
With weak fairness on Tick only a finite number of stuttering steps are permitted between ticks. This temporal logical statement about Tick is called a liveness assertion. In general, a liveness assertion should be machine-closed: it shouldn't constrain the set of reachable states, only the set of possible behaviours.M...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $X$ be a plaintext and $Y$ its ciphertext. Which statement is \textbf{not} equivalent to the others?
As an example, take p = 7 {\displaystyle p=7} and q = 11 {\displaystyle q=11} , then n = 77 {\displaystyle n=77} . Take m = 20 {\displaystyle m=20} as our plaintext. The ciphertext is thus c = m 2 mod n = 400 mod 77 = 15 {\displaystyle c=m^{2}{\bmod {n}}=400{\bmod {77}}=15} .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $X$ be a plaintext and $Y$ its ciphertext. Which statement is \textbf{not} equivalent to the others?
{\displaystyle {\textrm {ciphertext}}=E_{K3}(D_{K2}(E_{K1}({\textrm {plaintext}}))).} That is, DES encrypt with K 1 {\displaystyle K1} , DES decrypt with K 2 {\displaystyle K2} , then DES encrypt with K 3 {\displaystyle K3} . Decryption is the reverse: plaintext = D K 1 ( E K 2 ( D K 3 ( ciphertext ) ) ) .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{\emph{incorrect}} assertion. A $\Sigma$-protocol \dots
. ) {\displaystyle \,\vert \psi '\rangle \langle \psi '\vert +(...)} , where the dots denote components of ρ out {\displaystyle \rho _{\operatorname {out} }} resulting from errors not properly corrected by the protocol. It follows that This fidelity is to be compared with the corresponding fidelity obtained when no err...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{\emph{incorrect}} assertion. A $\Sigma$-protocol \dots
Message with indicator "VFG": XCYBGDSLVWBDJLKWIPEHVYGQZWDTHRQXIKEESQSSPZXARIXEABQIRUCKHGWUEBPF Message with indicator "VFX": YNSCFCCPVIPEMSGIZWFLHESCIYSPVRXMCFQAXVXDVUQILBJUABNLKMKDJMENUNQ Hut 8 would punch these onto banburies and count the repeats for all valid offsets −25 letters to +25 letters. There are two promis...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
The statistical distance between two distributions is \dots
The variation distance of two distributions X {\displaystyle X} and Y {\displaystyle Y} over a finite domain D {\displaystyle D} , (often referred to as statistical difference or statistical distance in cryptography) is defined as Δ ( X , Y ) = 1 2 ∑ α ∈ D | Pr − Pr | {\displaystyle \Delta (X,Y)={\frac {1}{2}}\sum _{...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
The statistical distance between two distributions is \dots
In statistics, probability theory, and information theory, a statistical distance quantifies the distance between two statistical objects, which can be two random variables, or two probability distributions or samples, or the distance can be between an individual sample point and a population or a wider sample of point...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{\emph{correct}} assertion. A random oracle $\ldots$
The truth table of P ↚ Q {\displaystyle P\nleftarrow Q} .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{\emph{correct}} assertion. A random oracle $\ldots$
The truth table of P ↓ Q {\displaystyle P\downarrow Q} is as follows:
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Consider an Sbox $S:\{0,1\}^m \rightarrow \{0,1\}^m$. We have that \ldots
The Cayley transform for general symmetric operators can be adapted to this special case. For every non-negative number a, | a − 1 a + 1 | ≤ 1. {\displaystyle \left|{\frac {a-1}{a+1}}\right|\leq 1.}
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Consider an Sbox $S:\{0,1\}^m \rightarrow \{0,1\}^m$. We have that \ldots
The third term is ≤ M s ( b − a ) {\displaystyle \leq Ms(b-a)} . Hence, summing the estimates up, we get: | f ( a + t ( b − a ) ) − f ( a ) | ≤ t M | b − a | {\displaystyle |f(a+t(b-a))-f(a)|\leq tM|b-a|} , a contradiction to the maximality of s {\displaystyle s} . Hence, 1 = s ∈ M {\displaystyle 1=s\in M} and that mea...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. In RSA \ldots
RSA-400 has 400 decimal digits (1,327 bits), and has not been factored so far. RSA-400 = 2014096878945207511726700485783442547915321782072704356103039129009966793396 1419850865094551022604032086955587930913903404388675137661234189428453016032 6191193056768564862615321256630010268346471747836597131398943140685464051631 ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. In RSA \ldots
Every expression (message send) has a value. Thus ifTrue:ifFalse: can be used:
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Consider the cipher defined by $$\begin{array}{llll} C : & \{0,1\}^{4} & \rightarrow & \{0,1\}^{4} \\ & x & \mapsto & C(x)=x \oplus 0110 \\ \end{array} $$ The value $LP^C(1,1)$ is equal to
For RC5P, analysis was conducted modulo 3. It was observed that the operations in the cipher (rotation and addition, both on 32-bit words) were somewhat biased over congruence classes mod 3. To illustrate the approach, consider left rotation by a single bit: X ⋘ 1 = { 2 X , if X < 2 31 2 X + 1 − 2 32 , if X ≥ 2 31 {\di...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Consider the cipher defined by $$\begin{array}{llll} C : & \{0,1\}^{4} & \rightarrow & \{0,1\}^{4} \\ & x & \mapsto & C(x)=x \oplus 0110 \\ \end{array} $$ The value $LP^C(1,1)$ is equal to
Decryption of a ciphertext ( R n + 1 , L n + 1 ) {\displaystyle (R_{n+1},L_{n+1})} is accomplished by computing for i = n , n − 1 , … , 0 {\displaystyle i=n,n-1,\ldots ,0} R i = L i + 1 , {\displaystyle R_{i}=L_{i+1},} L i = R i + 1 ⊕ F ⁡ ( L i + 1 , K i ) . {\displaystyle L_{i}=R_{i+1}\oplus \operatorname {F} (L_{i+1}...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $n=pq$ be a RSA modulus and let $(e,d)$ be a RSA public/private key. Tick the \emph{correct} assertion.
In this example, an RSA modulus purporting to be of the form n = pq is actually of the form n = pqr, for primes p, q, and r. Calculation shows that exactly one extra bit can be hidden in the digitally signed message. The cure for this was found by cryptologists at the Centrum Wiskunde & Informatica in Amsterdam, who de...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $n=pq$ be a RSA modulus and let $(e,d)$ be a RSA public/private key. Tick the \emph{correct} assertion.
This RSA modulus is made public together with the encryption exponent e. N and e form the public key pair (e, N). By making this information public, anyone can encrypt messages to Bob. The decryption exponent d satisfies e d = 1 mod λ ( N ) {\displaystyle ed=1{\bmod {\lambda }}(N)} , where λ ( N ) {\displaystyle \lambd...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{true} assertion. A distinguishing attack against a block cipher\dots
Attacks that allow distinguishing ciphertext from random data.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{true} assertion. A distinguishing attack against a block cipher\dots
Before starting off the symmetric encryption process, the input message M ∈ B ∗ {\displaystyle M\in B^{\ast }} is divided into blocks M 1 , . . .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. Let $n >1 $ be a composite integer, the product of two primes. Then,
( 5 21 ) = 1 but 5 21 − 1 2 ≡ 16 ( mod 21 ) . {\displaystyle {\begin{aligned}\left({\frac {19}{45}}\right)&=1&&{\text{ and }}&19^{\frac {45-1}{2}}&\equiv 1{\pmod {45}}.\\\left({\frac {8}{21}}\right)&=-1&&{\text{ but }}&8^{\frac {21-1}{2}}&\equiv 1{\pmod {21}}.\\\left({\frac {5}{21}}\right)&=1&&{\text{ but }}&5^{\frac {...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. Let $n >1 $ be a composite integer, the product of two primes. Then,
Therefore, if (1) concludes that N is composite, it truly is composite. (2) and (3) check if Q has order 2 k {\displaystyle 2^{k}} . Thus, if (2) or (3) conclude N is composite, it is composite. Now, if the algorithm concludes that N is prime, then that means S 1 {\displaystyle S_{1}} satisfies the condition of Theorem...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $C$ be a permutation over $\left\{ 0,1 \right\}^p$. Tick the \emph{incorrect} assertion:
It can be shown that an arbitrary permutation of N objects can be written as a product of transpositions and that the number of transposition in this decomposition is of fixed parity. That is, either a permutation is always decomposed in an even number of transpositions (the permutation is called even and has the parit...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $C$ be a permutation over $\left\{ 0,1 \right\}^p$. Tick the \emph{incorrect} assertion:
That is, H n ( p 1 , p 2 , … p n ) = H n ( p i 1 , p i 2 , … , p i n ) {\displaystyle \mathrm {H} _{n}\left(p_{1},p_{2},\ldots p_{n}\right)=\mathrm {H} _{n}\left(p_{i_{1}},p_{i_{2}},\ldots ,p_{i_{n}}\right)} for any permutation { i 1 , . . .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. Assume an arbitrary $f:\{0,1\}^p \rightarrow \{0,1\}^q$, where $p$ and $q$ are integers.
The truth table of P ↚ Q {\displaystyle P\nleftarrow Q} .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{true} assertion. Assume an arbitrary $f:\{0,1\}^p \rightarrow \{0,1\}^q$, where $p$ and $q$ are integers.
Thus f0 is the truth value of ψ. In order to arithmetize ψ we must use the following rules: f i ( a 1 , … , a i ) = { f i + 1 ( a 1 , … , a i , 0 ) ⋅ f i + 1 ( a 1 , … , a i , 1 ) Q i + 1 = ∀ f i + 1 ( a 1 , … , a i , 0 ) ∗ f i + 1 ( a 1 , … , a i , 1 ) Q i + 1 = ∃ {\displaystyle f_{i}(a_{1},\dots ,a_{i})={\begin{cases...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{false} assertion. In order to have zero-knowledge from $\Sigma$-protocols, we need to add the use of \ldots
. ) {\displaystyle \,\vert \psi '\rangle \langle \psi '\vert +(...)} , where the dots denote components of ρ out {\displaystyle \rho _{\operatorname {out} }} resulting from errors not properly corrected by the protocol. It follows that This fidelity is to be compared with the corresponding fidelity obtained when no err...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{false} assertion. In order to have zero-knowledge from $\Sigma$-protocols, we need to add the use of \ldots
The forward direction is trivial and for the reverse direction suppose Γ {\displaystyle \Gamma } is a total computable functional. To build the truth-table for computing A(n) simply search for a number m such that for all binary strings σ {\displaystyle \sigma } of length m Γ σ ( n ) {\displaystyle \Gamma ^{\sigma }(n)...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
A Feistel scheme is used in\dots
The Feistel construction is also used in cryptographic algorithms other than block ciphers. For example, the optimal asymmetric encryption padding (OAEP) scheme uses a simple Feistel network to randomize ciphertexts in certain asymmetric-key encryption schemes. A generalized Feistel algorithm can be used to create stro...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
A Feistel scheme is used in\dots
A Feistel network uses a round function, a function which takes two inputs – a data block and a subkey – and returns one output of the same size as the data block. In each round, the round function is run on half of the data to be encrypted, and its output is XORed with the other half of the data. This is repeated a fi...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{false} assertion. The SEI of the distribution $P$ of support $G$ \ldots
Let X {\displaystyle \textstyle X} be the support of the distributions of interest. As in the original work of Kearns et al. if X {\displaystyle \textstyle X} is finite it can be assumed without loss of generality that X = { 0 , 1 } n {\displaystyle \textstyle X=\{0,1\}^{n}} where n {\displaystyle \textstyle n} is the ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{false} assertion. The SEI of the distribution $P$ of support $G$ \ldots
The truth table of P ↚ Q {\displaystyle P\nleftarrow Q} .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $X$, $Y$, and $K$ be respectively the plaintext, ciphertext, and key distributions. $H$ denotes the Shannon entropy. Considering that the cipher achieves \emph{perfect secrecy}, tick the \textbf{false} assertion:
The final output is H t | | G t {\displaystyle H_{t}||G_{t}} . The scheme has the rate R H i r o s e = k − n 2 n {\textstyle R_{Hirose}={\frac {k-n}{2n}}} relative to encrypting the message with the cipher. Hirose also provides a proof in the Ideal Cipher Model.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Let $X$, $Y$, and $K$ be respectively the plaintext, ciphertext, and key distributions. $H$ denotes the Shannon entropy. Considering that the cipher achieves \emph{perfect secrecy}, tick the \textbf{false} assertion:
Shannon proved, using information theoretic considerations, that the one-time pad has a property he termed perfect secrecy; that is, the ciphertext C gives absolutely no additional information about the plaintext. This is because (intuitively), given a truly uniformly random key that is used only once, a ciphertext can...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{correct} assertion. Assume that $C$ is an arbitrary random permutation.
There is a simple randomized polynomial-time algorithm that provides a ( 1 − 1 2 k ) {\displaystyle \textstyle \left(1-{\frac {1}{2^{k}}}\right)} -approximation to MAXEkSAT: independently set each variable to true with probability 1/2, otherwise set it to false. Any given clause c is unsatisfied only if all of its k co...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{correct} assertion. Assume that $C$ is an arbitrary random permutation.
The outline of a formal proof of the O(n log n) expected time complexity follows. Assume that there are no duplicates as duplicates could be handled with linear time pre- and post-processing, or considered cases easier than the analyzed. When the input is a random permutation, the rank of the pivot is uniform random fr...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which class of languages includes some which cannot be proven by a polynomial-size non-interactive proof?
These are the set of languages for which neither membership nor non-membership can be proven in a finite amount of time, and contain all other languages that are not in either RE or co-RE. That is: NRNC = ALL − ( RE ∪ co-RE ) {\displaystyle {\mbox{NRNC}}={\mbox{ALL}}-({\mbox{RE}}\cup {\mbox{co-RE}})} .Not only are thes...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which class of languages includes some which cannot be proven by a polynomial-size non-interactive proof?
A central question of proof complexity is to understand if tautologies admit polynomial-size proofs. Formally, Problem (NP vs. coNP) Does there exist a polynomially bounded propositional proof system? Cook and Reckhow (1979) observed that there exists a polynomially bounded proof system if and only if NP=coNP. Therefor...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Graph coloring consist of coloring all vertices \ldots
Every n-vertex complete graph Kn has an exact coloring with n colors, obtained by giving each vertex a distinct color. Every graph with an n-color exact coloring may be obtained as a detachment of a complete graph, a graph obtained from the complete graph by splitting each vertex into an independent set and reconnectin...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Graph coloring consist of coloring all vertices \ldots
The equality between the chromatic index and the list chromatic index has been conjectured to hold, even more generally, for arbitrary multigraphs with no self-loops; this conjecture remains open. Many other commonly studied variations of vertex coloring have also been extended to edge colorings. For instance, complete...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
What adversarial model does not make sense for a message authentication code (MAC)?
The stochastic model has no real way to fight against this sort of attack and as such is unsuited to dealing with the kind of "intelligent" threats that would be preferable to have defenses against. Therefore, a computationally bounded adversarial model has been proposed as a compromise between the two. This forces one...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
What adversarial model does not make sense for a message authentication code (MAC)?
Informally, a message authentication code system consists of three algorithms: A key generation algorithm selects a key from the key space uniformly at random. A signing algorithm efficiently returns a tag given the key and the message. A verifying algorithm efficiently verifies the authenticity of the message given th...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which one of these ciphers does achieve perfect secrecy?
Another way of stating perfect secrecy is that for all messages m 1 , m 2 {\displaystyle m_{1},m_{2}} in message space M, and for all ciphers c in cipher space C, we have Pr k ⇐ K = Pr k ⇐ K {\displaystyle {\underset {k\Leftarrow \mathrm {K} }{\operatorname {Pr} }}={\underset {k\Leftarrow \mathrm {K} }{\operatorname ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which one of these ciphers does achieve perfect secrecy?
Shannon proved, using information theoretic considerations, that the one-time pad has a property he termed perfect secrecy; that is, the ciphertext C gives absolutely no additional information about the plaintext. This is because (intuitively), given a truly uniformly random key that is used only once, a ciphertext can...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which of the following problems has not been shown equivalent to the others?
Many mathematical problems have been stated but not yet solved. These problems come from many areas of mathematics, such as theoretical physics, computer science, algebra, analysis, combinatorics, algebraic, differential, discrete and Euclidean geometries, graph theory, group theory, model theory, number theory, set th...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which of the following problems has not been shown equivalent to the others?
:Miscellaneous 18 problems:
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
A proof system is perfect-black-box zero-knowledge if \dots
We define the set of proof systems L EL := { K , KD45 , S4 , S4.2 , S4.3 , S4.3.2 , S4.4 , S5 } {\displaystyle \mathbb {L} _{\textsf {EL}}:=\{{\textsf {K}},{\textsf {KD45}},{\textsf {S4}},{\textsf {S4.2}},{\textsf {S4.3}},{\textsf {S4.3.2}},{\textsf {S4.4}},{\textsf {S5}}\}} . Moreover, for all H ∈ L EL {\displaystyle ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
A proof system is perfect-black-box zero-knowledge if \dots
We define the set of proof systems L EL := { K , KD45 , S4 , S4.2 , S4.3 , S4.3.2 , S4.4 , S5 } {\displaystyle \mathbb {L} _{\textsf {EL}}:=\{{\textsf {K}},{\textsf {KD45}},{\textsf {S4}},{\textsf {S4.2}},{\textsf {S4.3}},{\textsf {S4.3.2}},{\textsf {S4.4}},{\textsf {S5}}\}} . Moreover, for all H ∈ L EL {\displaystyle ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Suppose that you can prove the security of your symmetric encryption scheme against the following attacks. In which case is your scheme going to be the \textbf{most} secure?
To be strong, an algorithm needs to have a sufficiently long key and be free of known mathematical weaknesses, as exploitation of these effectively reduces the key size. At the beginning of the 21st century, the typical security strength of the strong symmetrical encryption algorithms is 128 bits (slightly lower values...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Suppose that you can prove the security of your symmetric encryption scheme against the following attacks. In which case is your scheme going to be the \textbf{most} secure?
Before starting off the symmetric encryption process, the input message M ∈ B ∗ {\displaystyle M\in B^{\ast }} is divided into blocks M 1 , . . .
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
For a $n$-bit block cipher with $k$-bit key, given a plaintext-ciphertext pair, a key exhaustive search has an average number of trials of \dots
Let P = P ‖ P ‖ P ‖ P {\displaystyle P=P\|P\|P\|P} be a 128-bit block of plaintext and C = C ‖ C ‖ C ‖ C {\displaystyle C=C\|C\|C\|C} be a 128-bit block of ciphertext, where P {\displaystyle P} and C {\displaystyle C} ( 0 ≤ i < 4 {\displaystyle 0\leq i<4} ) are 32-bit blocks. Let K i = K i ‖ K i ‖ K i ‖ K ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
For a $n$-bit block cipher with $k$-bit key, given a plaintext-ciphertext pair, a key exhaustive search has an average number of trials of \dots
Suppose that there are 100 million key texts that might plausibly be used, and that on average each has 11 thousand possible starting positions. To an opponent with a massive collection of possible key texts, this leaves possible a brute force search of the order of 2 40 {\displaystyle 2^{40}} , which by computer crypt...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{false} assertion. For a Vernam cipher...
The Vernam cipher implemented by the Lorenz SZ machines utilizes the Boolean "exclusive or" (XOR) function, symbolised by ⊕ and verbalised as "A or B but not both". This is represented by the following truth table, where x represents "true" and • represents "false". Other names for this function are: exclusive disjunct...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{false} assertion. For a Vernam cipher...
Verify the ciphertext preamble: If u 1 ≥ P {\displaystyle u_{1}\geq P} or u 2 ≥ P {\displaystyle u_{2}\geq P} or v ≥ P {\displaystyle v\geq P} , then return R e j e c t {\displaystyle Reject} . If u 1 q ≠ 1 r e m P {\displaystyle u_{1}^{q}\neq 1remP} , then return R e j e c t {\displaystyle Reject} . r e j e c t ← 0 {\...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Assume we are in a group $G$ of order $n = p_1^{\alpha_1} p_2^{\alpha_2}$, where $p_1$ and $p_2$ are two distinct primes and $\alpha_1, \alpha_2 \in \mathbb{N}$. The complexity of applying the Pohlig-Hellman algorithm for computing the discrete logarithm in $G$ is \ldots (\emph{choose the most accurate answer}):
In this section, we present the general case of the Pohlig–Hellman algorithm. The core ingredients are the algorithm from the previous section (to compute a logarithm modulo each prime power in the group order) and the Chinese remainder theorem (to combine these to a logarithm in the full group). (Again, we assume the ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Assume we are in a group $G$ of order $n = p_1^{\alpha_1} p_2^{\alpha_2}$, where $p_1$ and $p_2$ are two distinct primes and $\alpha_1, \alpha_2 \in \mathbb{N}$. The complexity of applying the Pohlig-Hellman algorithm for computing the discrete logarithm in $G$ is \ldots (\emph{choose the most accurate answer}):
As an important special case, which is used as a subroutine in the general algorithm (see below), the Pohlig–Hellman algorithm applies to groups whose order is a prime power. The basic idea of this algorithm is to iteratively compute the p {\displaystyle p} -adic digits of the logarithm by repeatedly "shifting out" all...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{\emph{incorrect}} assertion.
asserts that if p {\displaystyle p\,\!} is valid then so is q {\displaystyle q\,\!}
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \textbf{\emph{incorrect}} assertion.
"Fl." for flashing, "F." for fixed.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{correct} statement. $\Sigma$-protocols \ldots
. ) {\displaystyle \,\vert \psi '\rangle \langle \psi '\vert +(...)} , where the dots denote components of ρ out {\displaystyle \rho _{\operatorname {out} }} resulting from errors not properly corrected by the protocol. It follows that This fidelity is to be compared with the corresponding fidelity obtained when no err...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Tick the \emph{correct} statement. $\Sigma$-protocols \ldots
Protocols which have the above three-move structure (commitment, challenge and response) are called sigma protocols. The Greek letter Σ {\displaystyle \Sigma } visualizes the flow of the protocol. Sigma protocols exist for proving various statements, such as those pertaining to discrete logarithms. Using these proofs, ...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which defense(s) highlight the principle of least privilege in software security?
Honoring the Principle of least privilege at a granularity provided by the base system such as sandboxing of (to that point successful) attacks to an unprivileged user account helps in reliability of computing services provided by the system. As the chances of restarting such a process are better, and other services on...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which defense(s) highlight the principle of least privilege in software security?
When applied to users, the terms least user access or least-privileged user account (LUA) are also used, referring to the concept that all user accounts should run with as few privileges as possible, and also launch applications with as few privileges as possible. The principle of (least privilege) is widely recognized...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
For which kind of bugs does default LLVM provide sanitizers?
GPL. TinyVM. VMKit of LLVM.
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
For which kind of bugs does default LLVM provide sanitizers?
Rather the program's behavior is undefined. To make a fuzzer more sensitive to failures other than crashes, sanitizers can be used to inject assertions that crash the program when a failure is detected. There are different sanitizers for different kinds of bugs: to detect memory related errors, such as buffer overflows...
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which of the following hold(s) true about update deployment in the secure development lifecycle?
Secure Design should be a consideration at all points in the development lifecycle (whichever development methodology is chosen). Some pre-built Secure By Design development methodologies exist (e.g. Microsoft Security Development Lifecycle).
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus
Which of the following hold(s) true about update deployment in the secure development lifecycle?
Updates are released on a semiannual basis. The software utilizes Azure Availability Zones for updates. == References ==
https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus