Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

34. Suppose you have a private key encryption scheme. Explain why you might want to send a MAC along with the ciphertext when sending messages

image text in transcribed

34. Suppose you have a private key encryption scheme. Explain why you might want to send a MAC along with the ciphertext when sending messages 35. Suppose you have an ideal random function f: 0,10, 160 a) What is the probability that two random elements lead to a collision? b) How many randomly chosen elements do we need so that the probability that a collision occurs is 1/2 36. Suppose we have a hash function h 0.,11) -> {0,...,7), defined as follows 10 7 11 6 Using this hash function illustrate why it does not satisfy any of the properties that a cryptographic hash function might have (preimage resistance, second preimage resistance, collision resistance)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases And Information Systems 22nd European Conference Adbis 2018 Budapest Hungary September 2 5 2018 Proceedings Lncs 11019

Authors: Andras Benczur ,Bernhard Thalheim ,Tomas Horvath

1st Edition

3319983970, 978-3319983974

More Books

Students also viewed these Databases questions