Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

2.Consider the CBC-MAC from the following figure, and suppose that the encryption on key k1 (i.e., the last encryption block) is omitted. Show that such

2.Consider the CBC-MAC from the following figure, and suppose that the encryption on key k1 (i.e., the last encryption block) is omitted. Show that such the MAC system is not secure.

Hint: Choose an arbitrary one-block message m X, query the challenger for m and obtain its tag t = F(k,m). Now, find a two-block message m, such that t is a valid tag for m as well.image text in transcribed

Construction 1 encrypted CBC-MAC raw CBC mo) m[0] m(3] m[4] F(k,) ( Let F: KXX be a PRP Define new PRF FECBC . K2x XsL X F(k,)tag 1/ Construction 1 encrypted CBC-MAC raw CBC mo) m[0] m(3] m[4] F(k,) ( Let F: KXX be a PRP Define new PRF FECBC . K2x XsL X F(k,)tag 1/

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Information And Database Systems Asian Conference Aciids 2012 Kaohsiung Taiwan March 2012 Proceedings Part 2 Lnai 7197

Authors: Jeng-Shyang Pan ,Shyi-Ming Chen ,Ngoc-Thanh Nguyen

2012th Edition

3642284892, 978-3642284892

More Books

Students also viewed these Databases questions

Question

=+1. Have you interacted with a group of small children?

Answered: 1 week ago

Question

Distinguish between poor and good positive and neutral messages.

Answered: 1 week ago

Question

Describe the four specific guidelines for using the direct plan.

Answered: 1 week ago