subject

We consider a banking application, where messages m of the form fromAccount, toAccount, amount are sent within the bank network, with the meaning that amount dollars should be transferred from fromAccount to toAccount. Each message consists of three blocks, with each block holding one of the three parameters. Messages are encrypted using AES in Counter mode, i. e.Kj = E(K, Tj)Cj = Mj ⊕ KjEach of the three parts of a message is sixteen characters, i. e. one block, so messages consist of three blocks. a. The adversary has an account in the bank and can intercept and change messages. Imagine now that he knows the toAccount for a particular message m = C1C2C3. Explain how he can modify the message so that the amount is transferred to his own account. b. Explain how the use of a MAC would prevent this attack. c. Above, E(K, M) denotes using block cipher E with key K on message M. It is possible to define a cipher using similar ideas, but using a hash function instead. Describe how to do it, including how to decrypt.

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 15:00, madysonrose1007
The use of idps sensors and analysis systems can be quite complex. one very common approach is to use an open source software program called running on an open source unix or linux system that can be managed and queried from a desktop computer using a client interface.
Answers: 1
image
Computers and Technology, 21.06.2019 18:30, Svetakotok
Ineed on my history if anyone can check out the last few questions i posted and i will be posting !
Answers: 2
image
Computers and Technology, 22.06.2019 12:30, kayleigh2037
What characteristic of long period comets suggest they come directly from the oort cloud?
Answers: 2
image
Computers and Technology, 22.06.2019 17:30, bl88676
1. before plugging in a new device to a computer you should unplug all other devices turn off the computer turn on the computer 2. many of the maintenance tools for a computer can be found in the control panel under administrative tools display personalization
Answers: 1
You know the right answer?
We consider a banking application, where messages m of the form fromAccount, toAccount, amount are s...

Questions in other subjects:

Konu
Mathematics, 04.07.2019 05:00
Konu
History, 04.07.2019 05:00