Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Consider the following variant of the CBC - MAC, intended to allow one to MAC messages of arbitrary length. The construction uses a blockcipher E
Consider the following variant of the CBCMAC, intended to allow one to MAC messages of arbitrary length. The construction uses a blockcipher EK assumed to be secure and with a key space k domain, and range n The domain for the MAC contain messages of arbitrary length, but multiple of n bits. To MAC M under key K compute CBCK M M where M is the length of M written as n bits. In other words, append the length of M to M before applying the MAC. The verification algorithm computes the MAC for the message sent and compares with the provided tag. Show that this MAC is not UFCMA secure
Using below template:
PROOF
Given:
Write all given points from the question like Encryption Scheme, MsgSp KeySp, etc
Proof
Attack: Write what your queries are and the algorithm for how your adversary will win. Ex Consider adversary who submits the following LR query: The adversary then applies the following algorithm:
Justification: Explain why the attack works
Advantage: Calculate the advantage and show adversary will win with advantage not close to
Resources: Show the resources are reasonable; t: time, q: queries, : total length of queries usually number of bitsConsider the following variant of the MAC, intended to allow one to MAC
messages of arbitrary length. The construction uses a blockcipher
assumed to be secure and with a key space domain, and range
The domain for the MAC contain messages of arbitrary length, but multiple of
bits. To MAC M under key compute :: where :: is the length
of written as bits. In other words, append the length of to before
applying the MAC. The verification algorithm computes the MAC for the
message sent and compares with the provided tag. Show that this MAC is not
UFCMA secure
Using below template:
PROOF
Given:
Write all given points from the question like Encryption Scheme,
KeySp, etc
Proof
Attack: Write what your queries are and the algorithm for how your adversary
will win. Ex Consider adversary who submits the following LR query: The
adversary then applies the following algorithm:
Justification: Explain why the attack works
Advantage: Calculate the advantage and show adversary will win with
advantage not close to
Resources: Show the resources are reasonable; t: time, q: queries, : total
length of queries usually number of bits
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started