Question: problem a and b Problem 5 (Message Authentication Codes) (10 Points) Alice and Bob share a key k {0,1} Provide attacks to show why the

problem a and b
Problem 5 (Message Authentication Codes) (10 Points) Alice and Bob share a key k {0,1}" Provide attacks to show why the following algorithms are not secure Message Authentication Codes (MACs). (a) to authenticate m=m1||m2 mi, m2 {0,1}" use the tag Fx(m1)||Fx(m2) (b) to authenticate m= mi||m2 mi, m2 {0,1}n-I use the tag Fe(Ol|m)||F(1||m2)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
