Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Consider a variant of CMAC that XORs the second key (K1) after encrypting the final block of the message. That is, VMACK(M) = CBCK(M) K1,
Consider a variant of CMAC that XORs the second key (K1) after encrypting the final block of the message. That is, VMACK(M) = CBCK(M) K1, assuming M requires no padding.
Lets say the adversary does a chosen plaintext attack to get the VMAC for three messages 0n , 1n , and 0n ; 1n. Break the security of VMAC by showing that the adversary can compute the VMAC of the message 0n ; VMAC(0n ) VMAC(1n ).
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started