Consider a mac technique called cbc­mac

Assignment Help Computer Network Security
Reference no: EM13168144

Informally speaking, a MAC is secure if no efficient forger can generate any valid (message, tag) pair, even if the forger is given a tagging oracle. (As we discussed in class a tagging oracle is an algorithm that will tag arbitrary messages for an attacker.)

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final block of the ciphertext.

Demonstrate that this MAC scheme is not secure for variable length messages. Write pseudocode for an algorithm, F, that, given a tagging oracle Tk(m), can easily generate a (message, tag) pair for a message that was not sent to the tagging oracle.

Reference no: EM13168144

Questions Cloud

You can push multiple operands on the stack : You can push multiple operands on the stack. The operation will always use the two topmost values. For example, to evaluate (A+B+C), you can use the code below:
Pattern matching : Question 1 In sed, when you do pattern matching, the largest pattern is always matched first, left to right.
Consider architecture a that has the addressing : Consider architecture A that has the addressing modes below for the ADD instruction. Based on the ADD instruction, is this architecture better be encoded as a fixed-length instruction or a variablelength
Convert from base 10 to base 2. : Convert from base 10 to base 2.
Consider a mac technique called cbc­mac : Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..
Create an array that stores in integers from the keyboard : create an array that stores in integers from the keyboard and then I can scan that array to check numbers in order, if the number I check is greater than the previous then I will set the next number in the array to the higher value.
Write a generic class : Write a generic class (using Java generics) called Pair that stores two values of the generic type.  It should have a constructor to set them, two methods getfirst() and getsecond() to retrieve them.
Create an array that stores in integers from the keyboard : create an array that stores in integers from the keyboard and then I can scan that array to check numbers in order, if the number I check is greater than the previous then I will set the next number in the array to the higher value.
Definition of two queues : Write a code in C lenguage for the definition of two queues, one to hold the process in ready state and one to hold the process in waiting state. The queue should be designed to manage a process structure. Please comment the code.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Calculate m mod p in rsa cryptosystem

Assume that instead of using composite N = pq in RSA cryptosystem, we simply use prime modulus p. Calculate m mod p. Justify correctness and analyze running time of decryption algorithm.

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  Finding decryption function and recovered plaintext

If you receive the ciphertext message YPHDCRPBEQTAA, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Leaders and managers

One of business' contemporary rules states that organizations should move away from some top leaders and many managers to leaders at every level and few managers.

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd