Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

(c) A financial company allows its clients to transfer money between accounts in the company using messages that consist of three parts, M = M.M.Mz.

image text in transcribed

(c) A financial company allows its clients to transfer money between accounts in the company using messages that consist of three parts, M = M.M.Mz. where M specifies the number of the account. from which the money is being transferred, M, is the number of the account, into which the money is being transferred, and M, shows the actual amount of money being transferred. The messages are encrypted with an AES algorithm operating in the Counter mode, i.e. Ki = Ex(/Vli). C = M, K. Each message contains three blocks, M, M2, M3, which all contain sixteen charac- ters. 3 Turn over) Scanned with CamScanr -2 MATHEMATICS: CRYPTOGRAPHY (i) Suppose, an attacker also has an account in this financial company and is able to intercept and modify messages. Imagine now they know the number of the account, into which the money is going. M,. for a particular message M = CCC; that they have intercepted. Explain how they can mod this message so that the amount of money specified in M; is transferred to their own account. [6 marks) (ii) Explain how the use of a MAC would prevent this attack. (4 marks) (iii) Above, Ex(M) denotes using a block cipher E with the key K on the message M. It is possible to define a cipher using similar ideas, but using a hash function instead. Describe how to do it, and discuss how the decryption is done. (4 marks) (c) A financial company allows its clients to transfer money between accounts in the company using messages that consist of three parts, M = M.M.Mz. where M specifies the number of the account. from which the money is being transferred, M, is the number of the account, into which the money is being transferred, and M, shows the actual amount of money being transferred. The messages are encrypted with an AES algorithm operating in the Counter mode, i.e. Ki = Ex(/Vli). C = M, K. Each message contains three blocks, M, M2, M3, which all contain sixteen charac- ters. 3 Turn over) Scanned with CamScanr -2 MATHEMATICS: CRYPTOGRAPHY (i) Suppose, an attacker also has an account in this financial company and is able to intercept and modify messages. Imagine now they know the number of the account, into which the money is going. M,. for a particular message M = CCC; that they have intercepted. Explain how they can mod this message so that the amount of money specified in M; is transferred to their own account. [6 marks) (ii) Explain how the use of a MAC would prevent this attack. (4 marks) (iii) Above, Ex(M) denotes using a block cipher E with the key K on the message M. It is possible to define a cipher using similar ideas, but using a hash function instead. Describe how to do it, and discuss how the decryption is done. (4 marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Reforming The Governance Of The Financial Sector

Authors: David Mayes , Geoffrey Wood

1st Edition

0415686849, 978-0415686846

More Books

Students also viewed these Finance questions