Question: Case Study: Consider a sender A and a receiver B. A should send a message M to B. A want to give a proof for

Case Study: Consider a sender A and a receiver B.

A should send a message M to B. A want to give a proof for B that the message has not been modified during transmission. A uses a hashing function H. He uses also a symmetric encryption E which needs a shared key K. Let the concatenation operation be noted as ||

The receiver B uses a decryption algorithm D which needs the same key K as the sender. He also uses the same hash function H to produce a digest.

There are many ways to fulfill this objective. We here propose two cases and you will help drawing and explain them.

  1. Case 1 : Draw with explanation the use of message authentication using symmetric key encryption and a hash function. In this communication, only the digest should be encrypted. The message is sent as a clear plaintext. States what security objectives has been achieved by this scheme.
  2. Case 2 : Draw with explanation the use of message authentication using symmetric key encryption and a hash function. In this communication, both the message and the digest should be encrypted. States what security objectives has been achieved by this scheme.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!