Question
Case Study: Consider a sender A and a receiver B. A should send a message M to B. A want to give a proof for
Case Study: Consider a sender A and a receiver B.
A should send a message M to B. A want to give a proof for B that the message has not been modified during transmission. A uses a hashing function H. He uses also a symmetric encryption E which needs a shared key K. Let the concatenation operation be noted as ||
The receiver B uses a decryption algorithm D which needs the same key K as the sender. He also uses the same hash function H to produce a digest.
There are many ways to fulfill this objective. We here propose two cases and you will help drawing and explain them.
- Case 1 : Draw with explanation the use of message authentication using symmetric key encryption and a hash function. In this communication, only the digest should be encrypted. The message is sent as a clear plaintext. States what security objectives has been achieved by this scheme.
- Case 2 : Draw with explanation the use of message authentication using symmetric key encryption and a hash function. In this communication, both the message and the digest should be encrypted. States what security objectives has been achieved by this scheme.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started