Question: 2 . 1 Scheme The MAC prepends a secret symmetric key to an input message, then passes it to the SHA 1 algorithm: tag =

2.1 Scheme
The MAC prepends a secret symmetric key to an input message, then passes it to
the SHA1 algorithm:
tag = Sha1(password \| message)
You dont know the symmetric key, but you do know what length it might be (See
the Objective section)
2.2 Length Extension Attack
A length extension attack is a type of attack where an attacker can use the hash
of a message and the length of the message to calculate the hash of that message
prepended to another message, where the second message is chosen by the attacker.
This can be done without knowing the content of the first message.
This MAC is vulnerable to a length extension attack. Specifically, its possible
to forge a valid (message, tag) pair where the message has some arbitrary data
appended to the end, while only knowing the length of the password (not its
actual value).
This is problematic in the MAC construction above because an attacker can include
extra information at the end of the message and produce a valid hash without knowing
the secret.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!