Question
Question) Subject: Information Security Title: HMAC: Hash-based Message Authentication Code Steps: You are required to design the crypto system. 1. System design: provide step by
Question)
Subject: Information Security
Title: HMAC: Hash-based Message Authentication Code
Steps: You are required to design the crypto system. 1. System design: provide step by step implementation of the encryption algorithm of Hash-based Message Authentication Code
2. Testing and error correction: Test each part of the design and list the errors you encountered during the design process (a table that describes each error separately)
3. Include diagrams
NOTE!!!! : The implementation can be written in C Language Code ( with COMMENTS because I am not familiar with C Language and I need to understand the meaning of each line of code) or done using Excel Functions.
Code that was answered by Chegg study experts: but it does NOT Run on any compilers, and it gives errors about this #include "msp430x26x.h" which is the header used
#include "msp430x26x.h" #include "TI_SHA2.h" /* The following code example shows a hashing of a message using SHA-224. Although an array of eight 32-bit words are used for the hashing process, only the first seven 32-bit words are used as the hash result. */ uint32_t M[32]; //Message array to be hashed uint64_t L = 0x0000000000000000; //Bit Length of message to be hashed uint32_t Ha[8]; // Hash Array to be used during calculation and to store result int main( void ) { M[0] =0x41424344; //Data M[1] =0x45464748; //Data M[2] =0x494A4B4C; //Data L = 0x0000000000000060 //Length == 96 bits or 0x60 bits SHA_256(M, L, Ha, 0); // "0" indicates SHA-224 mode.
} return 0;
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started