Question

In: Computer Science

13. Consider Message Authentication Codes: a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how...

13. Consider Message Authentication Codes:

a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how it is applied to generate and validate the MAC.

b) Describe any additional information is needed by the receiver to validate the MAC.

c) Explain whether the receiver can trust a successfully validated MAC and any assumptions about the additional information you identified in (b) for a validated MAC to be trusted.

Solutions

Expert Solution

This is MAC algorithm

a)

Symmetric key crypotsystem is used since we need to generate same MAC at reciever end to verify it.

The message and key combined are processed by a MAC algorithm which produces a MAC which is sent along with the message. At reciever end, with the same key and message, reciever generate MAC and compare it with the one receved. This ensure if the message isn't modified in between.

b)

Reciever needs to have the message (sent by sender) same algorithm(which is available) and the same symmetric key to generate MAC.

c) If the key is shared among any third person, we cannot verify its credibility. Also it does not prevent non repudiation. If key allow exhaustive search, message can be modified with MAC. It's security depend on underlying hash algorithm.If we use long key which can't be attacked by exhaustive search and preimage attacks with SHA512 like hash, we can successfully  trust a validated MAC and the message used


Related Solutions

Consider Message Authentication Codes: a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how it...
Consider Message Authentication Codes: a) Identify whether an symmetric/asymmetric cryptosystem is used and explain how it is applied to generate and validate the MAC. b) Describe any additional information is needed by the receiver to validate the MAC. c) Explain whether the receiver can trust a successfully validated MAC and any assumptions about the additional information you identified in (b) for a validated MAC to be trusted.
1) in a small paragraph explain the main differences between symmetric and asymmetric cryptographic algorithms ?...
1) in a small paragraph explain the main differences between symmetric and asymmetric cryptographic algorithms ? 2) when is a PKI requierd ?
What is the difference between symmetric competition and asymmetric competition? How would you expect species to...
What is the difference between symmetric competition and asymmetric competition? How would you expect species to react, adapt and evolve in response to each type of competition?
Give examples of asymmetric information and explain how companies and consumers deal with asymmetric information?
Give examples of asymmetric information and explain how companies and consumers deal with asymmetric information?
Please explain how a 4-way authentication handshake works.
Please explain how a 4-way authentication handshake works.
1. Explain what is meant by asymmetric information. (2 marks) 2. Explain whether each of the...
1. Explain what is meant by asymmetric information. 2. Explain whether each of the following situation involves adverse selection and moral hazard or not: i) I am financing a new car. In applying for a loan, I withhold information about my student loan, and the loan does not show up on my credit report. (2.5 marks) ii) Just before quitting my job, I take out all the credit cards I can. I plan to run them up to the5 limit...
Research eigenvalues/eigenvectors. Identify an application where they are used and explain how they are used in...
Research eigenvalues/eigenvectors. Identify an application where they are used and explain how they are used in the application in detail. Your post should be 2 - 3 paragraphs in length. Be sure to cite your source.
For each of the following sentences, identify what you consider to be logical inconsistencies. Explain whether...
For each of the following sentences, identify what you consider to be logical inconsistencies. Explain whether these inconsistencies relate to unsupported generalization, faulty cause/effect claims, either/or logic, slanting the facts, or exaggerations. Then revise the sentences to eliminate the logical inconsistencies. 1. Jim's Old Fashioned Burgers provides the best management training program in the industry. 2. The training consists of five stages: manager-in-training, second assistant manager first assistant manager, restaurant manager, and regional manager. The training places you on the...
Explain why the used car market is both an adverse selection and an asymmetric information problem.
Explain why the used car market is both an adverse selection and an asymmetric information problem.
Identify and explain the various barriers to change, and how the steps used by managers in...
Identify and explain the various barriers to change, and how the steps used by managers in the change process can overcome these barriers.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT