Question: We explore what happens when the basic CBC-MAC construction is used with messages of different lengths. Say the sender and receiver do not agree 0n

 We explore what happens when the basic CBC-MAC construction is used

We explore what happens when the basic CBC-MAC construction is used with messages of different lengths. Say the sender and receiver do not agree 0n the message length? in advance (and so Vrfy_k (m, t) = 1 iff t = ? MaC_k (m), regardless of the length of m), but the sender is careful to only authenticate messages of length 2n. Show that an adversary can forge a valid tag on a message of length 4n. Say the receiver only accepts 3-block messages (so Vrfy_k (m, t) = 1 only if m has length 3n and t = ? MaC_k (m)), but the sender authenticates messages of any length a multiple of n. Show that an adversary can forge a valid tag 0n a new message. We explore what happens when the basic CBC-MAC construction is used with messages of different lengths. Say the sender and receiver do not agree 0n the message length? in advance (and so Vrfy_k (m, t) = 1 iff t = ? MaC_k (m), regardless of the length of m), but the sender is careful to only authenticate messages of length 2n. Show that an adversary can forge a valid tag on a message of length 4n. Say the receiver only accepts 3-block messages (so Vrfy_k (m, t) = 1 only if m has length 3n and t = ? MaC_k (m)), but the sender authenticates messages of any length a multiple of n. Show that an adversary can forge a valid tag 0n a new message

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!