Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Consider a toy block cipher with a block size of 1 6 bits. The cipher is being used in Cipher Block Chaining Message Authentication Code
Consider a toy block cipher with a block size of bits. The cipher is being used in CipherBlock Chaining Message Authentication Code CBCMAC mode to provide integrity ofthe message. Alice uses this toy block cipher with a shared secret key, K and aninitialization vector IV V to generate a message authentication code MAC tag, T on themessage M as shown below in hexadecimal representation The message M consists oftwo blocks: block and block represented with M and M respectively.
Message, M: MxCFF MxAD IV: V x MAC: T xD
Due to some configuration error, the IV is left to be chosen by the user. Based on thisassumption as an adversary, you need to change the above message M to a message Msuch that M M but M will be accepted as legitimate with the MAC, T You may alsochange the initialization vector V if necessary. You need to show the details of yourworking process.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started