2025 CS6858 Distributed Trust Assignment 2
2025 CS6858 Distributed Trust Assignment 2
Assignment 2
CS 6858 : Jan – April/May, 2025 : John Augustine
Due : April 20, 2025 (11 PM)
1
Your Name
Instructions
1. You are allowed to discuss with others unless stated otherwise. The dis-
cussion should be for the purpose of jointly figuring out the approach to
solving the problem. You are NOT allowed to discuss detailed solution,
pseudocode, or analysis. You are NOT allowed to share your solution
either in LATEX form or handwritten notes, etc. Please acknowledge your
discussion partners in the Acknowledgments section at the end.
2. You must LATEX your answers. Include figures and plot graphs when-
ever you think it will help in expressing your idea. The figures can be
drawn using software (I use powerpoint for example) or hand-drawn and
scanned. IMPORTANT: all text and mathematics must be in LATEX. I
will ignore all text and mathematics that is handwritten and scanned.
3. Recall that the assignment is worth 5 marks (out of a total of 100). There
are two problems for this assignment and each problem part is worth 1
mark. Word your answers precisely and check them carefully. Typically,
no partial marks will be given for incorrect answers.
Contents
Problem 1. Attacking Ben-Or Protocol 3
Part 1. N = 2t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Part 2. N = 5t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Part 1. N = 2t
Design an attack strategy that violates the Ben-Or Consensus Protocol described
in class when N = 2t.
Part 2. N = 5t
Design an attack strategy that violates the Ben-Or Byzantine Protocol described
in class when N = 5t.
(termination) each live node outputs a number D after some finite amount of time,
Part 1. Design
Part 2. Agreement
Part 3. Validity
Acknowledgments
I would like to thank the following people with whom I discussed ideas.
• ???