Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Consider a toy block cipher with a block size of 1 6 bits. The cipher is being used in Cipher Block Chaining Message Authentication Code

Consider a toy block cipher with a block size of 16 bits. The cipher is being used in Cipher Block Chaining Message Authentication Code (CBC-MAC) mode to provide integrity of the message. Alice uses this toy block cipher with a shared secret key, K and an initialization vector (IV), V to generate a message authentication code (MAC) tag, T on the message M, as shown below (in hexadecimal representation). The message M consists of two blocks: block 0 and block 1 represented with M0 and M1, respectively.
Message, M: M0=0xCFF0, M1=0xA1D2 IV: V =0x1011 MAC: T =0x3D19
Due to some configuration error, the IV is left to be chosen by the user. Based on this assumption, as an adversary, you need to change the above message M to a message M' such that M != M', but M' will be accepted as legitimate with the MAC, T. You may also change the initialization vector V, if necessary. You need to show the details of your working process.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Sams Teach Yourself Beginning Databases In 24 Hours

Authors: Ryan Stephens, Ron Plew

1st Edition

067232492X, 978-0672324925

More Books

Students also viewed these Databases questions