Integrity verification

Assignment Help Computer Networking
Reference no: EM133280272

Consider CBC to provide confidentiality and CBC-Residue to provide integrity verification where we use one key K1 to generate CBC encryption of a given plaintext P=P1P2...Pn to produce the corresponding ciphertext C= C1C2...Cn and another key K2 to compute the CBC-Residue R from P for integrity verification as C=CBC(K1, P) and R=CBC-Residue(K2, P) and we send C and R to the receiver. Now assume that we want to modify the above mechanism to avoid doing a complete CBC for the second time in CBC-Residue computation as follows: C=CBC(K1,P) and R=AES(K2,Cn) where AES is the encryption algorithm we use in CBC and Cn is the last block of C in CBC(K1, P). In other words, instead of doing a full CBC to produce the CBC-Residue R, we encrypt the last block of CBC (i.e., Cn) using the second key K2 and use it as the CBC-Residue value. We then send C and R to the receiver site. Would this modification make any difference from security point of view? Justify your answer.

Reference no: EM133280272

Questions Cloud

Command line argument : C program that takes one command line argument: the fully qualified name of a folder. The program creates two children processes.
Why signals encoding is important in data communication : Describe three reasons why signals encoding is important in data communication.
What is career development in profession : What is career development in profession? explain thoroughly.
Solution to synchronization problem : Which of the following is NOT a solution to the synchronization problem when sending a message to a remote computer?
Integrity verification : Consider CBC to provide confidentiality and CBC-Residue to provide integrity verification where we use one key K1 to generate CBC encryption of given plaintext
Network indicating the means of communication : It must show the topology of the Network indicating the means of communication and the link with the remote Data Server (WAN), taking into account
Assembling the data field in original datagram : Consider that the IP entity creates a buffer for assembling the data field in the original datagram.
What tools did you utilize during your investigation : What network adapter did you utilize to run Wireshark on? What tools did you utilize during your investigation? What was discovered about the information?
Subnet compared with the individual host scans : What can you say about the results when scanning multiple hosts and/or a subnet compared with the individual host scans?

Reviews

Write a Review

Computer Networking Questions & Answers

  Briefly investigate networking technologies

Briefly investigate some networking technologies and Determine the names and function of numerous networking organisations designing standards

  Write client and server java swing application using socket

Write client and server, Java Swing application using socket connections which permits the client to specify filename to server in Textfield and server send contents of text file back to client if it exists.

  Define each protocol and describe two data transmission

Define each protocol and describe at least two data transmission technologies associated with the protocol. Include bandwidth limitations of each technology.

  Compute both unadjusted and adjusted function-point count

Compute both the unadjusted and adjusted function-point count for this system, stating carefully any assumptions you are making.

  Explain why there are three mac addresses

Explain why there are three MAC addresses listed in 802.11 Wireless PDUs and Compare the results of your analysis in the above step (7) with the findings of Act

  Describe how and where ip datagram fragments are reassembled

Describe how and where IP datagram fragments are reassembled. Make sure to explain how fragments from multiple datagram's are sorted out and how the order of fragments is resolved for each set of fragments.

  Define the ethernet interface

Using the netstat Program Time Required: 10 minutes Objective: Use the netstat program to view network interface and IP protocol status and statistics.

  Identify which vendors may be fit for the good foods company

Identify which vendor(s) may be a fit for the Good Foods company, based on the company's current needs.

  Designing and installing wlan with multiple aps in ess

Why is Wi-Fi channel selection important when designing and installing a WLAN with multiple APs in an ESS? Explain.

  What vlans should devices in the ip subnet be in

What VLAN(s) should devices in the IP subnet be in? What type of route adds the subnet to the routing table of a Cisco device when the ip address command is issued on an interface with a state of Up/Up?

  Youre logged on locally to a users computer and your

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Describe the network configuration

For the networking report, describe the network configuration, explaining the role of each component and connection, following the diagram provided by your supervisor.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd