Question: Suppose there is an authentication application that sends the user an image of a playing card, and the user has to identify the card by
Suppose there is an authentication application that sends the user an image of a playing card, and the user has to identify the card by selecting a rank eg "Ace" and a suit eg "Spades" from two menus. There are card images, each approximately kB in size and resembling a traditional playing card with a white background.An attacker could try to write code to detect what image is received and match it to one of a set of images previously received and identified manually. To prevent this type of attack, it has been suggested that each image be encrypted with a key derived from a hash of the user's password.Of the modes of operation discussed in this course, which would be the most appropriate to encrypt these images?Name the mode,explain why it is the most appropriate and explain how the encryption would be performed.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
