Question: When we combine different cryptographic primitives ( e . g . , combining a CPA - secure encryption scheme with a MAC to obtain a
When we combine different cryptographic primitives eg combining a CPA
secure encryption scheme with a MAC to obtain a CCAsecure scheme we
generally require the different primitives to use separate, independent keys.
What happens if the keys are the same? Specifically, consider an Encrypt
and Authenticate scheme, c EnckE
m and t MACkM m Let the
Enc to be the CBC mode of operation and MAC be CBCMAC. If we let
kM kE can you describe a message integrity attack that will not be detected
by the MAC scheme.
proof mathematically
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
