Question: In a certain network protocol, each datagram consists of a 5 1 2 - bit header and a 5 1 2 - bit payload. An
In a certain network protocol, each datagram consists of a bit header and a bit payload.
An organisation decides to store hashed datagrams for analytic purposes. These hash values
need to be calculated on resourcelimited devices that can only process data in bit chunks.
Thankfully, the devices have hardware implementations of the following cryptographic algorithms:
E: a secure block cipher with bit keys, bit inputs, and bit outputs, and
H: asecure internal hash function with bit inputs and bit outputs.
Since the internal hash function H cannot process entire datagrams, it is necessary to design a
hashing method that can compute datagram hashes based on the internally implemented
algorithms. The engineers come up with the following designs for hashing datagrams:
Design A: hash the header and payload separately, then XOR the results, ie
Hashdatagram HheaderHpayload
Design B: hash the header and payload separately, then concatenate and hash the results, ie
Hashdatagram H Hheader Hpayload
Design C: encipher the payload using E with the header as key, then XOR the result with the
header, ie
Hashdatagram H Eheaderpayload header
In these formulas, denotes the bitwise exclusive or operation and denotes string
concatenation. The designed datagram hashing method is called Hash to distinguish it from the
internal hash function H
Tasks
i Marks The organisation needs to develop a program that looks at the stored datagram
hash values and for any two hashed datagrams reliably distinguishes if the original
datagrams were identical or not. Identify the security requirement on datagram hashing in
this case, and briefly justify your answer.
ii Marks Consider the three candidate designs, ie Designs A B and C above. For
each design, discuss if it satisfies the security requirement identified in part i or not. In
each case provide a convincing argument or an attack to support your answer.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
