Question: e message authentication the Hash function to compute the 5. (15 pts) Assume Alice and Bob has a shared secret 1001 to be used to
e message authentication the Hash function to compute the 5. (15 pts) Assume Alice and Bob has a shared secret 1001 to be used to com code. Alice wants to send the message 101101010100 to Bob. Suppose message authentication code is the 4-bit Internet Checksum. That is, the user message is bit blocks and then apply the binary add for the bits between the groups. Please compu authentication code to be transmitted together with the user message for Alice. Atthe Tee (Bob), please also compute the message authentication code to verify if the message is put is divided into 4- te the message not changed. 6. (15 pts) GSM uses three security algorithms, A3, A5, and A8. Describe their functionalities and ho they ensure security between mobile station and BTS
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
