Block size = 8 bits Hash size = 8 bits Encryption function: Divide the key into two halves: LK and RK; Divide the plaintext into two halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT; where LC, RC, LT, and RT are each 4 bits; Plaintext and ciphertext are each 8 bits. g(H) = an 8-bit string that is equal to the complement of bits in H; For example, if H=A3 (Hexa) = 10100011 (binary); then g(H)= 01011100 H0 = Initial hash = 11001010 Given a message m: CAB2 (in Hexa); Q1. Determine the hash (in hexadecimal) of the message M using Martyas-Meyer-Oseas hash function (Fig. 11.7). Q.2 Determine the hash (in hexadecimal) of the message M using Davis-Meyer hash function (Fig. 11.6) Q.3 Determine the hash (in hexadecimal) of the message M using Migayuchi-Preneel hash function (Fig. 11.6)
Block size = 8 bits
Hash size = 8 bits
Encryption function: Divide the key into two halves: LK and RK; Divide the plaintext into two
halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT;
where LC, RC, LT, and RT are each 4 bits; Plaintext and ciphertext are each 8 bits.
g(H) = an 8-bit string that is equal to the complement of bits in H; For example, if H=A3 (Hexa)
= 10100011 (binary); then g(H)= 01011100
H0 = Initial hash = 11001010
Given a message m: CAB2 (in Hexa);
Q1. Determine the hash (in hexadecimal) of the message M using Martyas-Meyer-Oseas hash
function (Fig. 11.7).
Q.2 Determine the hash (in hexadecimal) of the message M using Davis-Meyer hash function
(Fig. 11.6)
Q.3 Determine the hash (in hexadecimal) of the message M using Migayuchi-Preneel hash
function (Fig. 11.6)



Trending now
This is a popular solution!
Step by step
Solved in 2 steps









