(10 points) You are a manager in an IT company. You ask your…

(10 points) You are a manager in an IT company. You ask your security specialists to design a new authenticated encryption scheme that uses some block cipher (e.g. AES) as a building block and has some properties useful for your application. To make sure the schemes are secure you also ask the specialists to prove security of their schemes based on the PRF security of the block cipher and to present the resulting concrete security statements.In a week you get 4 scheme designs  that have the desired properties and similar efficiency (take equal time to encrypt and decrypt messages of equal length). The schemes are accompanied by the following security statements. For every efficient adversary  attacking INT-CTXT security of the encryption scheme, there exists an adversary  attacking the PRF security of the block cipher  with comparable resources, and for every efficient adversary ‘ attacking IND-CPA security of the encryption scheme by making  queries to its LR-encryption oracle, of total length

A high-end handbag designer is testing their latest handbag…

A high-end handbag designer is testing their latest handbag designs to improve sales. Version A features a slightly larger handbag, while Version B highlights a smaller-style handbag. The designer selects two groups, V1 and V2, to run an A/B test. Group V1 rates the larger bag, and group V2 rates the smaller style. You can consider the rating to be on a scale of 1-10. Assuming a significance level of 0.01. Define a clear null hypothesis and alternative hypothesis for this A/B test. Identify the independent variable and the dependent variable. Would the extraneous variables be addressed if V1 and V2 were selected from outside of the U.S.? Justify your answer, Can you use a two-sample t-test assuming equal variances? Justify your answer. Under which conditions would you reject or fail to reject the null hypothesis?