Question: Consider an application that encrypts messages using AES with CBC mode, and authenticates them using CBC-MAC with the same key and IV. Describe why this
Consider an application that encrypts messages using AES with CBC mode, and authenticates them using CBC-MAC with the same key and IV. Describe why this authentication method is useless in the presence of a CPA adversarythat is, how anyone who can obtain a messages encryption can easily output a valid MAC tag for that message.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
