Question: Let F : { 0 , 1 } k times { 0 , 1 } n - > { 0 , 1 } n
Let F : k times n n be a good MAC. Suppose that a database contains records M Mq To provide authenticity for the records, the admin generates a random secret key K in k and stores Ti FKMi alongside record Mi for every i q This does not ensure authenticity because an attacker can remove a record or duplicate a record without being detected. To deal with this, the admin generates another secret key K in k and computes an additional tag T She stores K K T in her machine, away from the database.
How should the admin compute T so that if we update a single record Mi the cost to update TiT is cheap, meaning we need to run the MAC to sign messages of total size OMiqn Briefly explain why your solution can detect if an adversary modified the database.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
