Question

A fundamental cryptographic principle states that all messages must have redundancy. But we also know that redundancy helps an intruder tell if a guessed key is correct. Consider two forms of redundancy. First, the initial n bits of the plaintext contain a known pattern. Second, the final n bits of the message contain a hash over the message. From a security point of view, are these two equivalents? Discuss your answer.

$1.99
Sales0
Views480
Comments0
  • CreatedJanuary 30, 2010
  • Files Included
Post your question
5000