Question: Before HMAC, it was common to define a MAC for arbitrary-length messages by Macs,k (m) H8(A 11 m), where H is a collision-resistant hash function

 Before HMAC, it was common to define a MAC for arbitrary-length

Before HMAC, it was common to define a MAC for arbitrary-length messages by Macs,k (m) H8(A 11 m), where H is a collision-resistant hash function 1. Show that this is never a secure MAC when H is constructed via the Merkle- Damgrd transform. (Assume that the hash key s is known to the attacker, and only k is kept secret.) 2. Prove that this is a secure MAC if H is modeled as a random oracle

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!