Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3. In this exercise, you will prove that the CBC-MAC in its plain form is not secure to authenticate variable-length messages (a) Consider the CBC-MAC

image text in transcribed

3. In this exercise, you will prove that the CBC-MAC in its plain form is not secure to authenticate variable-length messages (a) Consider the CBC-MAC scheme with an n-bit block cipher where the CBC checksum of a message is calculated with a zero IV. Describe an attack where an attacker Eve can construct the MAC of a message different from those she obtained from the legitimate sender. (Hint Let the attacker obtain the MAC of two n-bit messages and from them compute the MAC of a 2n-bit message.) (b) An attempt to solve this problem could be to append the number of blocks in the message as a final block to the message: i.e., to apply CBC on (M2) instead of M alone, where denotes the number of blocks in M. Show that this construction is not secure either. (Hint: Let the attacker obtain the MAC of some more messages of his choice (c) How about prepending the number of blocks; i.e., to apply CBC on (C|M)? Does a similar attack work on this construction as well? How would its performance compare to thel appending scheme of part (b)? 3. In this exercise, you will prove that the CBC-MAC in its plain form is not secure to authenticate variable-length messages (a) Consider the CBC-MAC scheme with an n-bit block cipher where the CBC checksum of a message is calculated with a zero IV. Describe an attack where an attacker Eve can construct the MAC of a message different from those she obtained from the legitimate sender. (Hint Let the attacker obtain the MAC of two n-bit messages and from them compute the MAC of a 2n-bit message.) (b) An attempt to solve this problem could be to append the number of blocks in the message as a final block to the message: i.e., to apply CBC on (M2) instead of M alone, where denotes the number of blocks in M. Show that this construction is not secure either. (Hint: Let the attacker obtain the MAC of some more messages of his choice (c) How about prepending the number of blocks; i.e., to apply CBC on (C|M)? Does a similar attack work on this construction as well? How would its performance compare to thel appending scheme of part (b)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Next Generation Databases NoSQLand Big Data

Authors: Guy Harrison

1st Edition

1484213300, 978-1484213308

More Books

Students also viewed these Databases questions