Question: This problem compares MAC and HMAC when the key is known to the attacker. (1) Suppose that you know a MAC value X and the

This problem compares MAC and HMAC when the key is known to the attacker. (1) Suppose that you know a MAC value X and the key K that was used to compute the MAC, but you do not know the original message. Can you construct a message M that also has its MAC equal to X? (2) Suppose that you know the output of an HMAC is X and the key is K, but you do not know the message M. Can you construct a message M that has its HMAC equal to X, using the key K?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!