Bob is launching a new secure messaging app BobCrypt When Al
Solution
a) This scheme does not reach the intended security goal as the hash of each function used is not hiding the committed value. Here Bob is acting malciously to determine the phone numbers and contacts of all BobCrypt users as the app is reading all the contacts saved in the phone without even taking the permission of the user. In other words, the data of one\'s phone is transferred to the server without providing any information to the user.
b) This is because, the details of numbers are stored in the server with a random 128-bit which is chosen by the app. But the fact is, the app wants to provide the information of the other people in the contact list whether they are using the same app or not. The scenario remains same, though the value retrieved by the server is kept with some random bits chosen, but indirectly it is being revealed to the other users. So one can say, the binding commitment is not kept. If the app would have taken the permissions of the user whether they want to share the contacts of their phone with the server than it could have been a different story.
