subject

We consider a banking application, where messages m of the form fromAccount, toAccount, amount are sent within the bank network, with the meaning that amount dollars should be transferred from fromAccount to toAccount. Each message consists of three blocks, with each block holding one of the three parameters. Messages are encrypted using AES in Counter mode, i. e.Kj = E(K, Tj)Cj = Mj ⊕ KjEach of the three parts of a message is sixteen characters, i. e. one block, so messages consist of three blocks. a. The adversary has an account in the bank and can intercept and change messages. Imagine now that he knows the toAccount for a particular message m = C1C2C3. Explain how he can modify the message so that the amount is transferred to his own account. b. Explain how the use of a MAC would prevent this attack. c. Above, E(K, M) denotes using block cipher E with key K on message M. It is possible to define a cipher using similar ideas, but using a hash function instead. Describe how to do it, including how to decrypt.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 09:30
You wanted to look up information about alzheimer's, but you were unsure if it was spelled "alsheimer's" or "alzheimer's." which advanced search strategy would be useful? a) a boolean search b) using a wild card in your search c) trying different search engines d) doing a search for "alsheimer's not alzheimer's" asap. ill give brainlist.
Answers: 1
question
Computers and Technology, 24.06.2019 17:50
You will subnet the network address 172.31.103.0/24. the network has the following requirements: · room-114 lan will require 27 host ip addresses · room-279 lan will require 25 host ip addresses · room-312 lan will require 14 host ip addresses · room-407 lan will require 8 host ip addresses how many subnets are needed in the network topology?
Answers: 2
question
Computers and Technology, 24.06.2019 19:30
Which phrase is the best definition of a pivottable a a table containing data that is organized horizontally b a table used to calculate financial pivot values c a tool used to summarize data d a table containing specific formatting
Answers: 1
question
Computers and Technology, 24.06.2019 21:40
Which of these is not a type of socket? aga (alternating grid array) pga (pin grid array) spga (staggered pin grid array) lga (land grid array)
Answers: 1
You know the right answer?
We consider a banking application, where messages m of the form fromAccount, toAccount, amount are s...
Questions
question
Mathematics, 05.03.2021 04:10
question
Mathematics, 05.03.2021 04:10
question
Business, 05.03.2021 04:10
question
History, 05.03.2021 04:10
question
History, 05.03.2021 04:10
question
Mathematics, 05.03.2021 04:10