diff --git a/exam/ex.tex b/exam/ex.tex index 266bdf0..8e3d212 100644 --- a/exam/ex.tex +++ b/exam/ex.tex @@ -380,7 +380,13 @@ Futhermore, the commitment is also not vulnerable to dictionary attacks, as is common with stored password hashes on the server's side. - \item \TODO + \item If the function generating the isomorphisms keeps the same $k=36$ + first vertices, the security degrades considerably. Under normal + circumstances, the number of possible isomorphisms is $1107!$. If the + first $36$ vertices are always kept the same, the domain shrinks to + $(1107-36)!=1071!$. While the difference might not seem to be practically + relevant, the security degrades factorially with every further reduction + in graph size. \item The signer calculates a commitment with a predefined soundness error. Then the signer calculates the challenge by taking the hash of the message