Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Consider the following proposal for a cryptographic hash function, that makes use of a block cipher E with block size k bits to produce k

image text in transcribed

Consider the following proposal for a cryptographic hash function, that makes use of a block cipher E with block size k bits to produce k bit hash values. The message to be hashed is split into sequence M, M2.... M of k bit blocks. For simplicity, we ignore padding and consider only messages whose length is a multiple of the block size. Hashing works as follows: H= IV, hi = Em., for i = 1,2,...n. The hash of the message is h . Here IV is a fixed, public initialization vector, which is part of the definition of the hash function. The purpose of this problem is to show that this is not a very good scheme. Given hash value h and any message M, one can design a meet-in-the-middle attack that extends M with two blocks to produce a message that as has a hash value. The expected running time of the attack is in the order of 2k/2 encryptions and decryptions of a single block. Describe such an attack in detail, including motivations for time and apace requirements

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Select Healthcare Classification Systems And Databases

Authors: Katherine S. Rowell, Ann Cutrell

1st Edition

0615909760, 978-0615909769

More Books

Students also viewed these Databases questions