Consider a mac technique called cbc­mac

Assignment Help Computer Network Security
Reference no: EM13168144

Informally speaking, a MAC is secure if no efficient forger can generate any valid (message, tag) pair, even if the forger is given a tagging oracle. (As we discussed in class a tagging oracle is an algorithm that will tag arbitrary messages for an attacker.)

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final block of the ciphertext.

Demonstrate that this MAC scheme is not secure for variable length messages. Write pseudocode for an algorithm, F, that, given a tagging oracle Tk(m), can easily generate a (message, tag) pair for a message that was not sent to the tagging oracle.

Reference no: EM13168144

Questions Cloud

You can push multiple operands on the stack : You can push multiple operands on the stack. The operation will always use the two topmost values. For example, to evaluate (A+B+C), you can use the code below:
Pattern matching : Question 1 In sed, when you do pattern matching, the largest pattern is always matched first, left to right.
Consider architecture a that has the addressing : Consider architecture A that has the addressing modes below for the ADD instruction. Based on the ADD instruction, is this architecture better be encoded as a fixed-length instruction or a variablelength
Convert from base 10 to base 2. : Convert from base 10 to base 2.
Consider a mac technique called cbc­mac : Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..
Create an array that stores in integers from the keyboard : create an array that stores in integers from the keyboard and then I can scan that array to check numbers in order, if the number I check is greater than the previous then I will set the next number in the array to the higher value.
Write a generic class : Write a generic class (using Java generics) called Pair that stores two values of the generic type.  It should have a constructor to set them, two methods getfirst() and getsecond() to retrieve them.
Create an array that stores in integers from the keyboard : create an array that stores in integers from the keyboard and then I can scan that array to check numbers in order, if the number I check is greater than the previous then I will set the next number in the array to the higher value.
Definition of two queues : Write a code in C lenguage for the definition of two queues, one to hold the process in ready state and one to hold the process in waiting state. The queue should be designed to manage a process structure. Please comment the code.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Analyse security procedures

Analyse security procedures

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Apply division method to calculate hash value of character

How can we apply division method to calculate hash value of character string without using more than constant number of words of storage outside string itself?

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  Attacking the devises by doing buffer overflow

Implement buffer overflow in c++ And attacking the devises by doing buffer overflow.

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for their network. Print your results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd