4. * A forgery attack on UMTA/4G-LTE integrity check and authentication. Let a small size UIA2/EIA1...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
4. * A forgery attack on UMTA/4G-LTE integrity check and authentication. Let a small size UIA2/EIA1 be defined over a finite field GF(31) where there is no truncating operation (i.e., each of P, Q, OTP is 5-bit, which is an element in GF(31)). Let P = 00111 and M = 001100101111100. The GHASH of M, the component in UIA2/EIA 1, is given by GHASHP(M) = M₁P³ + M₂P² + M3P where M = (M1, M2, M3) where M₁ = 00110, M2 = 01011, M3 = 11100 which are treated as binary numbers in GF(31), and the right most the least significant bit. (a) Compute GHASHp(M), the GHASH component in EIA 1. (b) For M' = 100000011100000, compute GHASHp(M'). (c) With Q = 00011 and OTP 00110, show that after attacker intercepts the MAC(M) and MAC(M'), he can forge a valid MAC(M₂) where M₂ a(M + M')+M where a is any nonzero element in GF(31). (Hint. Show that MAC(M₂) = a[MAC(M) + MAC(M')] + MAC(M).) CREADO 4. * A forgery attack on UMTA/4G-LTE integrity check and authentication. Let a small size UIA2/EIA1 be defined over a finite field GF(31) where there is no truncating operation (i.e., each of P, Q, OTP is 5-bit, which is an element in GF(31)). Let P = 00111 and M = 001100101111100. The GHASH of M, the component in UIA2/EIA 1, is given by GHASHP(M) = M₁P³ + M₂P² + M3P where M = (M1, M2, M3) where M₁ = 00110, M2 = 01011, M3 = 11100 which are treated as binary numbers in GF(31), and the right most the least significant bit. (a) Compute GHASHp(M), the GHASH component in EIA 1. (b) For M' = 100000011100000, compute GHASHp(M'). (c) With Q = 00011 and OTP 00110, show that after attacker intercepts the MAC(M) and MAC(M'), he can forge a valid MAC(M₂) where M₂ a(M + M')+M where a is any nonzero element in GF(31). (Hint. Show that MAC(M₂) = a[MAC(M) + MAC(M')] + MAC(M).) CREADO
Expert Answer:
Answer rating: 100% (QA)
a GHASHPM MP3 M2P2 M3P 00110P3 01011P2 11100P 2631P3 1021P2 3025P 14795P3 16676P2 311P 160671P3 1834... View the full answer
Related Book For
Microeconomics Theory and Applications with Calculus
ISBN: 978-0133019933
3rd edition
Authors: Jeffrey M. Perloff
Posted Date:
Students also viewed these computer network questions
-
Let P and Q be two probability measures defined on the measurable space ((, A), and suppose that P ( Q (i.e., P < < Q and Q < < P). Let f = dP/d and g = dQ/d for some (-finite measure dominating...
-
Let f be defined by Where m is a constant. (A) Graph f for m = 0, and find (B) Graph f for m = 1, and find (C) Find m so that and graph f for this value of m. (D) Write a brief verbal description of...
-
Show that Where M = M1 + M2. M. M
-
DTG agreed to merge with the SPQ. The total equity purchase price of $45,000 is going to be 50% financed issuing DTGs common shares and 50% financed with cash raised by DTG issuing long-term debt....
-
In pent-2-yne (CH3CCCH2CH3) there are four atoms in a straight line. Use dashed lines and wedges to draw a threedimensional representation of this molecule, and circle the four atoms that are in a...
-
How are oligopoly and monopolistic competition alike? How are they different?
-
Use the pain tolerance ratings (PainTolerance) after the activity to estimate the difference in mean pain tolerance between those who just completed a synchronized activity and those who did a...
-
Children's Hospital of the King's Daughter in Norfolk, Virginia, introduced a new budgeting method that allowed the hospital's annual plan to be updated for changes in operating plans. For example,...
-
Marin Company produces two software products ( Cloud - X and Cloud - Y ) in two separate departments ( A and B ) . These products are highly regarded network maintenance programs. Cloud - X is used...
-
The information listed below refers to the employees of Lemonica Company for the year ended December 31, 2016. The wages are separated into the quarters in which they were paid to the individual...
-
1. Comet Inc, a retailer, provided the following balances from its records for the year ended December 31, 2022. Based on a physical count of goods at the warehouse, Inventory on 12/31/22 is...
-
What does INVEST stand for?
-
Briefly explain the two types of measurement errors.
-
What is a comparative rating scale?
-
How long does a daily Scrum take?
-
Briefly explain itemized rating scales and how they differ from the continuous rating scale.
-
A company yesterday paid its annual dividend of $3.75 and maintained its historic 6.45 per cent annual rate of growth. You plan to purchase the shares today because you believe that the dividend...
-
Define relevant costs and discuss: (1) whether all future costs are relevant for decision making and (2) whether variable costs are always relevant and fixed costs are always irrelevant
-
Why does differentiating its product allow an oligopoly to charge a higher price?
-
In panel c of Figure 10.5, the joint production possibility frontier is concave to the origin. When the two individual production possibility frontiers are combined, however, the resulting PPF could...
-
A mayor wants to help renters in her city. She considers two policies that will benefit renters equally. One policy is a rent control, which places a price ceiling, p, on rents. The other is a...
-
Wisconsin Tool Company Wisconsin Tool Company (WTC) is a business located in Madison, WI that manufacturers tool and die equipment. WTC executed three sales in Year 23. See Sale Agreements in the...
-
Saenz-Qualified Business Income Javier and Maria Saenz, married filing jointly, have several investments. Their adjusted gross income and taxable income for 2023 is \( \$ \) 300,000 and \( \$ \)...
-
Find the Laplace transform of the following signals and locate the poles and zeros of \(F(s)\). (a) \(f(t)=-10 \mathrm{~d} \delta(t) / d t\) (b) \(f(t)=120 \cos (377 t) u(t)\). (c)...
Study smarter with the SolutionInn App