Question: 26. Explain why H(m h(m and H(m) h(mk) are not secure MACs when the un- derlying hash function uses the Merkle-Damgrd constructions? Go through the

 26. Explain why H(m h(m and H(m) h(mk) are not secure

26. Explain why H(m h(m and H(m) h(mk) are not secure MACs when the un- derlying hash function uses the Merkle-Damgrd constructions? Go through the attacks for 27. The CBC-MAC uses a block cipher in cbe-mode to create a hash fnction. Is this secure? 28. Suppose we propose the following MAC: given a message broken into blocks m, mi, ..., each. When is sccure and when is it not? mr, we compute G = AESk(m)4-1 for i L.r, where k is a shared secret key and co k. The MAC tag is the value c. Is this a secure MAC? Can you create any forgeries? Does it matter if we insist that the message length be a multiple of the block length? Does it matter if we have to pad the last block? 29. EMAC is the encrypted CBC-MAC. How does it differ from cbe-mac? Is this secure? What flaw in CBC-MAC does EMAC address

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!