Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

( 9 points ) Message authentication code. In this question, we are confronted with bad MAC design. We have an n - bit key K

(9 points) Message authentication code. In this question, we are confronted with bad MAC
design. We have an n-bit key K. Let BK:{0,1}n{0,1}n be a PRP secure block cipher.
Consider messages m of length 3n bits. Write m=m1||m2||m3 where |m1|=|m2|=|m3|=n.
The symbol || denotes concatenation of strings. Our MAC function is defined as:
MACK(m)=BK(?bar(m1))o+BK(m3)||BK(?bar(m2)o+m3).
Consider a generation query of the form m1||1n||m3, that provides you with the tag T=t1||t2.
(a) Give explicit expressions for t1 and t2.[Hint: Your expressions will likely use BK.]
(b) Show how you can make a forgery for this MAC function without making any other gener-
2pt
ation queries. [Show that a verification query on your forgery outputs that the tag is valid.
Hint: You can distill more information from the generation query than just the values t1
and t2.]
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Graph Databases

Authors: Ian Robinson, Jim Webber, Emil Eifrem

1st Edition

1449356265, 978-1449356262

More Books

Students also viewed these Databases questions