Question: When we combine different cryptographic primitives ( e . g . , combining a CPA - secure encryption scheme with a MAC to obtain a

When we combine different cryptographic primitives (e.g., combining a CPA-
secure encryption scheme with a MAC to obtain a CCA-secure scheme) we
generally require the different primitives to use separate, independent keys.
What happens if the keys are the same? Specifically, consider an Encrypt
and Authenticate scheme, c EnckE
(m) and t MACkM (m). Let the
Enc to be the CBC mode of operation and MAC be CBC-MAC. If we let
kM = kE, can you describe a message integrity attack that will not be detected
by the MAC scheme.
proof mathematically

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!