Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In a certain network protocol, each datagram consists of a 5 1 2 - bit header and a 5 1 2 - bit payload. An

In a certain network protocol, each datagram consists of a 512-bit header and a 512-bit payload.
An organisation decides to store hashed datagrams for analytic purposes. These hash values
need to be calculated on resource-limited devices that can only process data in 512-bit chunks.
Thankfully, the devices have hardware implementations of the following cryptographic algorithms:
E: a secure block cipher with 512-bit keys, 512-bit inputs, and 512-bit outputs, and
H: asecure internal hash function with 512-bit inputs and 256-bit outputs.
Since the internal hash function H cannot process entire datagrams, it is necessary to design a
hashing method that can compute datagram hashes based on the internally implemented
algorithms. The engineers come up with the following designs for hashing datagrams:
Design A: hash the header and payload separately, then XOR the results, i.e.
Hash(datagram)= H(header)H(payload)
Design B: hash the header and payload separately, then concatenate and hash the results, i.e.
Hash(datagram)= H( H(header)\| H(payload))
Design C: encipher the payload using E with the header as key, then XOR the result with the
header, i.e.
Hash(datagram)= H( Eheader(payload) header )
In these formulas, denotes the bitwise exclusive or operation and \| denotes string
concatenation. The designed datagram hashing method is called Hash to distinguish it from the
internal hash function H.
Tasks
(i)[2 Marks] The organisation needs to develop a program that looks at the stored datagram
hash values and for any two hashed datagrams reliably distinguishes if the original
datagrams were identical or not. Identify the security requirement on datagram hashing in
this case, and briefly justify your answer.
(ii)[8 Marks] Consider the three candidate designs, i.e., Designs A, B, and C, above. For
each design, discuss if it satisfies the security requirement identified in part (i) or not. In
each case provide a convincing argument or an attack to support your answer.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing

Authors: David M. Kroenke

12th Edition International Edition

1292023422, 978-1292023427

More Books

Students also viewed these Databases questions

Question

1. Write the distribution of scores on the board after tests.

Answered: 1 week ago

Question

What is cultural tourism and why is it growing?

Answered: 1 week ago

Question

5. Understand how cultural values influence conflict behavior.

Answered: 1 week ago

Question

8. Explain the relationship between communication and context.

Answered: 1 week ago