Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

( 8 points ) Hashes and MACs A Message Authentication Code ( MAC ) consists of two algorithms ( S , V ) . Algorithm

(8 points)
Hashes and MACs
A Message Authentication Code (MAC) consists of two algorithms (S,V). Algorithm
S(k,m) uses a secret key k to generate an integrity tag for a message m. Algorithm
V(k,m,t) uses a secret key k to validate a given integrity tag t for m.
Recall that a cryptographic hash function h is a non-keyed function that outputs a short
hash h(m) for an input message m. The function is said to be collision resistant if it is
difficult to find a collision: two distinct messages m0,m1 such that h(m0)=h(m1).
Let us consider four mechanisms for providing file integrity for a single file F on disk.
The file system must be able to detect any unauthorized modification to this file. We say
that the system is secure if an attacker cannot modify F without being detected. You
may assume that the owner of file F has a password known to the system, but not to the
attacker.
Method 1: Compute an integrity tag for file F and store the integrity tag in the
header of F. Upon file open the file system checks that the integrity tag is valid.
(a)(2 points) Suppose the integrity tag is computed using a collision resistant
hash function applied to F. Validating the integrity tag upon file open is done
by rehashing the file and comparing the result to the value in the file header.
Is the resulting system secure?
(b)(2 points) Suppose the integrity tag is computed as the MAC of F using the
user's password as the MAC secret key. Is the resulting system secure?Method 2: Compute an integrity tag for file F and store the integrity tag in read
only memory (say, a disk partition that the attacker can read but not modify).
(a)(2 points) Suppose the integrity tag is computed using a collision resistant
hash function. Is the resulting system secure?
(b)(2 points) Suppose the integrity tag is computed using a MAC with the user's
password as the secret key. Is the resulting system secure?
In all sections, please justify your answer.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

List the different categories of international employees. page 642

Answered: 1 week ago

Question

Explain the legal environments impact on labor relations. page 590

Answered: 1 week ago