SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
James F. Kurose, Keith W. Ross
Chapter:
Security In Computer Networks
Exercise:
Review
Question:11 | ISBN:9780132856201 | Edition: 6

Question

Consider a variation of the MAC algorithm (Figure 8.9) where the sender sends (m, H(m) + s), where H(m) + s is the concatenation of H(m) and s. Is this variation flawed? Why or why not?

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

Still the intruder can sniff the sender’s message (m, H(m)+s) with variation in the MAC (Message Authentication Code) algorithm.

The intruder can extract ‘s’  from the message ‘m’ by performing hashing H(m). The extraction is performed as (H(m)+s-H(m)).

Also, there is a scope to Trudy send a modified message as he knows the secret key. The message is generated as (m’,H(m’)+s).

Therefore, the MAC algorithm with the given variation contains flaws.

0 0

Discussions

Post the discussion to improve the above solution.