Question: This problem compares MAC and HMAC when the key is known to the attacker. (1) Suppose that you know a MAC value X and the
This problem compares MAC and HMAC when the key is known to the attacker. (1) Suppose that you know a MAC value X and the key K that was used to compute the MAC, but you do not know the original message. Can you construct a message M that also has its MAC equal to X? (2) Suppose that you know the output of an HMAC is X and the key is K, but you do not know the message M. Can you construct a message M that has its HMAC equal to X, using the key K?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
