Answered step by step
Verified Expert Solution
Question
1 Approved Answer
( 8 points ) Hashes and MACs A Message Authentication Code ( MAC ) consists of two algorithms ( S , V ) . Algorithm
points
Hashes and MACs
A Message Authentication Code MAC consists of two algorithms Algorithm
uses a secret key to generate an integrity tag for a message Algorithm
uses a secret key to validate a given integrity tag for
Recall that a cryptographic hash function is a nonkeyed function that outputs a short
hash for an input message The function is said to be collision resistant if it is
difficult to find a collision: two distinct messages such that
Let us consider four mechanisms for providing file integrity for a single file on disk.
The file system must be able to detect any unauthorized modification to this file. We say
that the system is secure if an attacker cannot modify without being detected. You
may assume that the owner of file has a password known to the system, but not to the
attacker.
Method : Compute an integrity tag for file and store the integrity tag in the
header of Upon file open the file system checks that the integrity tag is valid.
a points Suppose the integrity tag is computed using a collision resistant
hash function applied to Validating the integrity tag upon file open is done
by rehashing the file and comparing the result to the value in the file header.
Is the resulting system secure
b points Suppose the integrity tag is computed as the MAC of using the
user's password as the MAC secret key. Is the resulting system secureMethod : Compute an integrity tag for file and store the integrity tag in read
only memory say a disk partition that the attacker can read but not modify
a points Suppose the integrity tag is computed using a collision resistant
hash function. Is the resulting system secure
b points Suppose the integrity tag is computed using a MAC with the user's
password as the secret key. Is the resulting system secure
In all sections, please justify your answer.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started