Question

In: Computer Science

NC3A- 3.1 List three approaches to message authentication. 3.2 What is a message authentication code? 3.4...

NC3A-

  • 3.1 List three approaches to message authentication.

  • 3.2 What is a message authentication code?

  • 3.4 What properties must a hash function have to be useful for message authentication?

  • 3.5 In the context of a hash function, what is a compression function

Solutions

Expert Solution

Answer)

3.1) The message authentication is mostly being achieved by the use of Message Authentication Code (MACs), the authenticated encryption (AE) and the Digital Signatures.

The message authentication code is referred to as the digital authenticator which is being used as the integrity check with respect to the secret key being shared by the 2 parties for authenticating the information being transmitted between those.

This is being based on the use of a cryptographic hash or symmetric encryption algorithm. Here the authentication key is being shared with a minimum of 2 parties or 2 communication devices whereas it will fall in the existence of the third party as the algorithm would no longer be effective in detecting the forgeries. Also, the key would also be randomly be generated for avoiding the recovery via the brute force searches as well as related key attacks meant for identifying from that of the messages transmitting the medium.

3.2) When cryptography is taken into consideration the message authentication code is referred to as tag and is a short piece of information which is being used for authenticating the message. It helps in confirming the message is generated from the stated sender and also has not changed.

3.4) Hash function has certain properties which make the message authentication cryptographically secure. This takes input as a message of an arbitrary length and then produces the message digest or the hash of the fixed length.

The hash function uses the input data and also the hash function uniformly distributed the data via the complete set of possible hash values.

3.5) When cryptography is considered the compression function is referred to as the function which would transform the two fixed-length which is at a fixed-length output.

If you found the answer useful, hit like
Hope this answer helps.
Thanks


Related Solutions

QUESTION THREE [15] 3.1 Questions 3.1 to 3.2 is based on the excerpt below. Shine is...
QUESTION THREE [15] 3.1 Questions 3.1 to 3.2 is based on the excerpt below. Shine is one of many firms in the market for toothpaste which is in short-run equilibrium. It engages in advertising to create the perception of a unique product. Discuss the long-run aggregate supply curve. 3.1.1 Draw a diagram illustrating Shine’s demand curve, marginal revenue curve, average total cost curve and marginal cost curve, clearly labeling the company’s profit maximizing output, price and equilibrium position. Include in...
of a concrete slab (ksi): 2.5, 3.5, 2.2, 3.2, 2.9, 4.3, 3.7, 3.4, 3.1, 2.8, 1.9,...
of a concrete slab (ksi): 2.5, 3.5, 2.2, 3.2, 2.9, 4.3, 3.7, 3.4, 3.1, 2.8, 1.9, and 2.1. (a) Compute the mean and standard deviation of the above data set (b) Compute the 25th, 50th, 75th and 90th percentile values of the compressive strength from the above dataset (c) Construct a boxplot for the above data set (d) Check if the largest value is an outlier following the z-score approach)
4.What is the purpose of padding, Message Authentication Code (MAC), handshake protocol, change cyber suite (CCS)...
4.What is the purpose of padding, Message Authentication Code (MAC), handshake protocol, change cyber suite (CCS) protocol? 5.How does TLS provide: confidentiality, availability, integrity, non-repudiation? 6.Is TCP a user of TLS services or does it provide services to TLS (hard question) – explain your answer in one sentence? 7.Does TLS use sequence numbers? 8.Sequence numbers can be used to launch replay attacks (as in TCP).How does TLS protect against replay attacks?
Question 3 Define the following terms: 3.1 WIKI 3.2 TRANSITIONS 3.3 AIDA 3.4 NETWORKING 3.5 PROOFREADING
Question 3 Define the following terms: 3.1 WIKI 3.2 TRANSITIONS 3.3 AIDA 3.4 NETWORKING 3.5 PROOFREADING
implement a Message Authentication Code program in either C/C++ or Python. See the following steps. 1....
implement a Message Authentication Code program in either C/C++ or Python. See the following steps. 1. Accept a message as keyboard input to your program. 2. Accept a secret key for the sender/recipient as keyboard input to your program. 3. Your hash function H() is simply the checksum. To compute the checksum, you add all the characters of the string in ASCII codes. For example, the checksum of a string "TAMUC" would be 84 + 65 + 77 + 85...
3.1 What is the IRR? 3.2 What is the VPN? When is it used? 3.3 What...
3.1 What is the IRR? 3.2 What is the VPN? When is it used? 3.3 What is ROI? What is it for? 3.4 What is the difference between TREMA and TMAR?
3.1 Write code that creates an ArrayList object named list and fills list with these numbers...
3.1 Write code that creates an ArrayList object named list and fills list with these numbers (using one or a pair of for or while loops): 0 1 2 3 4 0 1 2 3 4 3.2 Consider the ArrayList object named list containing these Integers: list = { 1, 2, 3, 4, 5, 4, 3, 2, 1, 0 } What are the contents of list after this loop completes? for (int i = 1; i < 10; ++i) {...
QUESTION THREE [20] 3.1 Explain the rationale behind the internal rate of return. (IRR) (3) 3.2...
QUESTION THREE [20] 3.1 Explain the rationale behind the internal rate of return. (IRR) (3) 3.2 Super Max Investments have just made an investment of R550 000 in a new Tata Telcoline delivery vehicle. This vehicle will be used for deliveries and generate revenues from such activities. Further details:  Expected useful life 5 years (straight line depreciation)  Salvage value 50 000  Cost of Capital 10% after tax  Tax rate 30% Year Cash flows 1 -220 000...
What are the different approaches and methods you can use to convey your promotional message. .What...
What are the different approaches and methods you can use to convey your promotional message. .What are the key skills involved in personal selling, especially closing the sale. .What are the major approaches to customer retention. .Identify sales forecasting methods. .What are the different approaches and methods you can use to craft your promotional message
List and explain what the three distinct and different approaches appraisers use to calculate estimated value...
List and explain what the three distinct and different approaches appraisers use to calculate estimated value of properties. Differentiate between Residential and Commercial Properties.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT