Question: Before HMAC, it was common to define a MAC for arbitrary-length messages by Macs,k (m) H8(A 11 m), where H is a collision-resistant hash function

Before HMAC, it was common to define a MAC for arbitrary-length messages by Macs,k (m) H8(A 11 m), where H is a collision-resistant hash function 1. Show that this is never a secure MAC when H is constructed via the Merkle- Damgrd transform. (Assume that the hash key s is known to the attacker, and only k is kept secret.) 2. Prove that this is a secure MAC if H is modeled as a random oracle
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
