Question: Suppose there is an authentication application that sends the user an image of a playing card, and the user has to identify the card by

Suppose there is an authentication application that sends the user an image of a playing card, and the user has to identify the card by selecting a rank (e.g. "Ace") and a suit (e.g. "Spades") from two menus. There are 52 card images, each approximately 32 kB in size and resembling a traditional playing card with a white background.An attacker could try to write code to detect what image is received and match it to one of a set of images previously received and identified manually. To prevent this type of attack, it has been suggested that each image be encrypted with a key derived from a hash of the user's password.Of the modes of operation discussed in this course, which would be the most appropriate to encrypt these images?Name the mode,explain why it is the most appropriate and explain how the encryption would be performed.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!