Demonstrate that this mac scheme is not secure

Assignment Help Computer Engineering
Reference no: EM13692263

Provide the answers for the following questions:

Informally speaking, a MAC is secure if no efficient forger can generate any valid (message, tag) pair, even if the forger is given a tagging oracle. (As we discussed in class a tagging oracle is an algorithm that will tag arbitrary messages for an attacker.)

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final block of the ciphertext.

Question 1: Demonstrate that this MAC scheme is not secure for variable length messages.

Question 2: Write pseudocode for an algorithm, F, that, given a tagging oracle Tk(m), can easily generate a (message, tag) pair for a message that was not sent to the tagging oracle.

Answer these questions in details and provide examples.

Reference no: EM13692263

Questions Cloud

What are public saving-private saving and national saving : What are public saving, private saving, and national saving? Solve these equations for the equilibrium values of C, I, NX, and Explain what you find using a graph.
Content of the queue at the beginning : Assume you are at the airport, waiting for the security check. There is one line (which is a FIFO queue), and 5 security check gates. Each person reaching in front of the queue is checked by the first available security gate.
Requirements for an automated home bottle : Flexible design enables a quick change from one bottle to another and easy adjustment of the cutting locations according to the size and shape of the container
Demonstrate that this mac scheme is not secure : Demonstrate that this MAC scheme is not secure for variable length messages - Write pseudocode for an algorithm, F, that, given a tagging oracle
Make a python program that uses the getcwd : Make a Python program that uses the getcwd() function to provide a string of the current working directory. Save the string in the variable current folder and display the value.
Write a generic class called pair that stores two values : Write a generic class called Pair that stores two values of the generic type. It should have a constructor to set them, two methods getfirst()
Two-way set-associative cache for a main memory : Determining the Tag, Line, and Word values for the Direct-mapped, associative, and two-way set-associative cache for a main memory address of EEEEEE.
Uses the sieve of eratosthenes algorithm : Write a complete program that uses the Sieve of Eratosthenes algorithm to list all prime numbers from 1 to 1,000 .

Reviews

Write a Review

Computer Engineering Questions & Answers

  Simulating the turing machine

Describe how to simulate the Turing machine along with singly infinite tape on the Turing machine with the doubly infinite tape. (Be sure to handle the can't move left" special case.) Describe how to simulate the Turing machine with the doubly inf..

  Basic strategic planning questions

What the basic strategic planning questions must be addressed for the infrastructure? Suppose that x and y are “int” variables and “ch” is a char variable.

  Write down a public static method named chunk25

Write down a public static method named chunk25 that takes a double and returns an integer that represents the number of chunks of 25 in that number. A chunk of 25 is 25, or any part thereof

  What profit do you see with partitioned view

Explain your idea for a database along with your thoughts for a partitioned view. 1. How will you use this partitioned view?

  Show by applying the limit test that each of the given is

show by applying the limit test that each of the following is true.a the functions fn nn-12 and gn n2 grow

  What is the value of x given the specified value for y

What is the value of X given the specified value for Y (both X are 8-bit unsigned values): This question has three parts (1,2, and 3)

  Developing logic for program

Design the logic for a program which reads in 100 customer records and stores first and last names and total purchases in three parallel arrays.

  Ethics and professional code of conduct due week 3 and

ethics and professional code of conduct due week 3 and worth 120 points before writing your position statement on

  Does the bureau of labor statistics provide any comments or

you are a staff writer at it flash magazine a popular online newsletter aimed at it professionals. your editor has

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Suppose that x is a vector that allready exists

Which is the right matlab logical expression to check whether the value of x is between -10 and 10 (inclusive).

  Algorithm for computing a topological ordering of a dag

But assume that we're given an arbitrary graph that may or may not be a DAG. Extend the topological ordering algorithm so that given an input directed graph G it outputs one of two thing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd