Question
. Alice developed a message authentication code (MAC) based on DES. Her algorithm works as follows: For a given input message M (assume that M
. Alice developed a message authentication code (MAC) based on DES. Her algorithm works as follows: For a given input message M (assume that M is formed by multiple blocks of 64 bits), represent M as M = (X1 || X2 || ... || Xm), where Xi is a 64-bit block and || represents concatenation. Compute Delta(M) = X1 ^ X2 ^ ... ^ Xm, where ^ represents bit-wise XOR. Then the MAC for M is computed as CK(M) = EK(Delta(M)), where E is DES encryption algorithm and K is the secret key. Unfortunately, this scheme is vulnerable. Describe an attack against it.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started