Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In a certain network protocol, each datagram consists of a 5 1 2 - bit header and a 5 1 2 - bit payload. An
In a certain network protocol, each datagram consists of a bit header and a bit payload.
An organisation decides to store hashed datagrams for analytic purposes. These hash values
need to be calculated on resourcelimited devices that can only process data in bit chunks.
Thankfully, the devices have hardware implementations of the following cryptographic algorithms:
E: a secure block cipher with bit keys, bit inputs, and bit outputs, and
H: asecure internal hash function with bit inputs and bit outputs.
Since the internal hash function H cannot process entire datagrams, it is necessary to design a
hashing method that can compute datagram hashes based on the internally implemented
algorithms. The engineers come up with the following designs for hashing datagrams:
Design A: hash the header and payload separately, then XOR the results, ie
Hashdatagram HheaderHpayload
Design B: hash the header and payload separately, then concatenate and hash the results, ie
Hashdatagram H Hheader Hpayload
Design C: encipher the payload using E with the header as key, then XOR the result with the
header, ie
Hashdatagram H Eheaderpayload header
In these formulas, denotes the bitwise exclusive or operation and denotes string
concatenation. The designed datagram hashing method is called Hash to distinguish it from the
internal hash function H
Tasks
i Marks The organisation needs to develop a program that looks at the stored datagram
hash values and for any two hashed datagrams reliably distinguishes if the original
datagrams were identical or not. Identify the security requirement on datagram hashing in
this case, and briefly justify your answer.
ii Marks Consider the three candidate designs, ie Designs A B and C above. For
each design, discuss if it satisfies the security requirement identified in part i or not. In
each case provide a convincing argument or an attack to support your answer.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started