Consider a variation of the MAC algorithm (Figure 8.9) where the sender sends (m, H(m) + s), where H(m) + s is the concatenation of H(m) and s. Is this variation flawed? Why or why not?
Still the intruder can sniff the sender’s message (m, H(m)+s) with variation in the MAC (Message Authentication Code) algorithm.
The intruder can extract ‘s’ from the message ‘m’ by performing hashing H(m). The extraction is performed as (H(m)+s-H(m)).
Also, there is a scope to Trudy send a modified message as he knows the secret key. The message is generated as (m’,H(m’)+s).
Therefore, the MAC algorithm with the given variation contains flaws.