Question: Bob designed another new scheme to detect whether a message is modified by an attacker (protecting data integrity). The scheme is to append to each
Bob designed another new scheme to detect whether a message is modified by an attacker (protecting data integrity). The scheme is to append to each message a SHA-256 hash of that message, then encrypt the whole appended message using AES with a known key to the public. Explain the vulnerability of Bobs design.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
