This chapter is from the book
What is the difference between a protocol and an algorithm?
In Prot 1.1 Alice can decide HEADS or TAILS. This may be an unfair advantage for some applications. Modify the protocol so that Alice can no longer have this advantage.
Hint: let a correct guess decide the side.
Let function f map from the space of 200-bit integers to that of 100-bit ones with the following mapping rule:
here "⊕" denotes bit-by-bit XOR operation, i.e.,
Is an unbroken cryptographic algorithm more secure than a known broken one? If not, why?
Complex systems are error-prone. Give an additional reason for a complex security system to be even more error-prone.