Suppose Alice computes the Secret prefix MAC (page 322: secret prefix MAC(x) = h(key || x)) for the message ”AM” (in ASCII) with key  “G” (in ASCII) that both Alice and Bob know. The hash function that is used is h(x1x2x3)= g(g(x1 XOR x2) XOR x3 ) where each xi is a character represented as 8 bits, and g(x) is a 8-bit string that is equal to the complement of bits in x. For example, g(10110011) = 01001100. The MAC is 8 bits. (8-bit ASCII representation of the characters is given below.) What is the Secret prefix MAC computed by Alice? Show the MAC as the single character. What information is sent by Alice to Bob?

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

a.

Compute CBC-MAC for a message of 16 bits, “8642” (in Hexa). Assume a block size of 8 bits with an IV=F1 (in hexa). For simplicity, assume the encryption to be a simple XOR of the key with the plaintext. Let the encryption key be B4 (in Hexa). 

(Hint: Divide the message into blocks of 8 bits each; XOR each block with the previous cipher output; then encrypt this with the key. For the first block, XOR it with IV. Details in pages 325-326 Ch.12 of the textbook)  
 
b. Suppose Alice computes the Secret prefix MAC (page 322: secret prefix MAC(x) = h(key || x)) for the message ”AM” (in ASCII) with key  “G” (in ASCII) that both Alice and Bob know. The hash function that is used is h(x1x2x3)= g(g(x1 XOR x2) XOR x3 ) where each xi is a character represented as 8 bits, and g(x) is a 8-bit string that is equal to the complement of bits in x. For example, g(10110011) = 01001100. The MAC is 8 bits. (8-bit ASCII representation of the characters is given below.)
  1. What is the Secret prefix MAC computed by Alice? Show the MAC as the single character.
  2. What information is sent by Alice to Bob?

c.

 Suppose Alice computes the Secret suffix MAC (page 322: secret suffix MAC(x) = h(x || key)) for the message ”AM” with key  “G” that both Alice and Bob know. The hash function that is used is h(x1x2x3)= g(g(x1

              XOR x2) XOR x3 ) where each xi is a character represented as 8 bits, and g(x) is a 8-bit string that is equal to the complement of bits in x. For example, g(10110011) = 01001100. The MAC is 8 bits. (8-bit ASCII representation of the characters is                  given below.)

 

    1. What is the Secret suffix MAC computed by Alice? Show the MAC as the single character.
    2. What information is sent by Alice to Bob.
Dec Hx Oct Char
Dec Hx Oct Html Chr
Dec Hx Oct Html Chr Dec Hx Oct Html Chr
0 000 NUL (null)
1 001 SOH (start of heading)
2 002 STX (start of text)
3 003 ETX (end of text)
4 004 EOT (end of transmission)
32 20 040   Space 64 40 100 @ @
3321 041 ! !
96 60 140 `
65 41 101 A A
97 61 141 a
98 62 142 b b
99 63 143 c
100 64 144 d d
69 45 105 E E 101 65 145 e e
70 46 106 F F 102 66 146 G#102; f
71 47 107 G G 103 67 147 G#103; g
72 48 110 H H 104 68 150 h h
105 69 151 i i
106 6A 152 j j
75 4B 113 K K 107 6B 153 k k
108 6C 154 l 1
109 6D 155 m m
a
rr
2.
34 22 042 "
66 42 102 B B
35 23 043 G#35; #
3624044 $ $
67 43 103 C C
68 44 104 D D
3
4
5 5 005 ENQ (enquiry)
37 25 045 % *
6 006 ACK (acknowledge)
7 007 BEL (bell)
8 010 BS
9 011 TAB (horizontal tab)
À 012 LF
в 013 VT
C 014 FF
D 015 CR
E 016 SO
F 017 SI
38 26 046 & &
7
39 27 047 ' '
40 28 050 G#40;
41 29 051 ) )
(NL line feed, new line) 42 2A 052 * *
43 2B 053 G#43; +
(NP form feed, new page) 44 2C 054 , ,
45 2D 055 -
46 2E 056 .
47 2F 057 G#47; /
48 30 060 0 0
(backspace)
73 49 111 I I
74 4A 112 J J
10
11
(vertical tab)
12
76 4C 114 L L
77 4D 115 M M
78 4E 116 N N
79 4F 117 O 0
80 50 120 P P
81 51 121 Q Q 113 71 161 q q
82 52 122 R R 11472 162 r r
13
(carriage return)
(shift out)
(shift in)
110 6E 156 n n
1l1 6F 157 &#lll; o
112 70 160 p p
14
15
16 10 020 DLE (data link escape)
17 11 021 Dci (device control 1)
18 12 022 DC2 (device control 2)
19 13 023 DC3 (device contrd 3)
20 14 024 DC4 (device controf 4)
21 15 025 NAK (negative acknowledge)
22 16 026 SYN (synchronous idle)
23 17 027 ETB (end of trans. block)
24 18 030 CAN (cancel)
25 19 031 EM
26 lA 032 SUB (substitute)
27 1B 033 ESC (escape)
28 10 034 FS
29 1D 035 GS
30 IE 036 RS
31 1F 037 US
49 31 061 1 1
50 32 062 2 2
51 33 063 3 3
52 34 064 4 4
53 35 065 5 5
83 53 123 S S
115 73 163 s s
84 54 124 T T 1l6 74 164 t t
85 55 125 U U 117 75 165 u u
86 56 126 V v 118 76 166 v v
54 36 066 6 6
55 37 067 7 7
56 38 070 G#56; 8
87 57 127 W W
119 77 167 w w
88 58 130 X X 120 78 170 x x
89 59 131 Y Y 121 79 171 y Y
90 5A 132 Z Z
91 5B 133 [ [
92 5C 134 \ \
(end of medium)
57 39 071 9 9
58 3A 072 : :
59 3B 073 &#59; ;
60 3C 074 G#60; <
61 3D 075 &#61; =
62 3E 076 &#62; >
63 3F 077 &#63; ?
122 7A 172 &#122; z
(file separator)
(group separator)
(record separator)
(unit separator)
123 7B 173 &#123; {
124 7C 174 &#124; |
125 7D 175 &#125; }
126 7E 176 &#126;
127 7F 177 &#127; DEL
Source: www.Lookup Tables.com
93 5D 135 &#93; ]
94 5E 136 &#94; *
95 5F 137 &#95;
Transcribed Image Text:Dec Hx Oct Char Dec Hx Oct Html Chr Dec Hx Oct Html Chr Dec Hx Oct Html Chr 0 000 NUL (null) 1 001 SOH (start of heading) 2 002 STX (start of text) 3 003 ETX (end of text) 4 004 EOT (end of transmission) 32 20 040 &#32; Space 64 40 100 &#64; @ 3321 041 &#33; ! 96 60 140 &#96; 65 41 101 &#65; A 97 61 141 &#97; 98 62 142 &#98; b 99 63 143 &#99; 100 64 144 &#100; d 69 45 105 &#69; E 101 65 145 &#101; e 70 46 106 &#70; F 102 66 146 G#102; f 71 47 107 &#71; G 103 67 147 G#103; g 72 48 110 &#72; H 104 68 150 &#104; h 105 69 151 &#105; i 106 6A 152 &#106; j 75 4B 113 &#75; K 107 6B 153 &#107; k 108 6C 154 &#108; 1 109 6D 155 &#109; m a rr 2. 34 22 042 &#34; 66 42 102 &#66; B 35 23 043 G#35; # 3624044 &#36; $ 67 43 103 &#67; C 68 44 104 &#68; D 3 4 5 5 005 ENQ (enquiry) 37 25 045 &#37; * 6 006 ACK (acknowledge) 7 007 BEL (bell) 8 010 BS 9 011 TAB (horizontal tab) À 012 LF в 013 VT C 014 FF D 015 CR E 016 SO F 017 SI 38 26 046 &#38; & 7 39 27 047 &#39; ' 40 28 050 G#40; 41 29 051 &#41; ) (NL line feed, new line) 42 2A 052 &#42; * 43 2B 053 G#43; + (NP form feed, new page) 44 2C 054 &#44; , 45 2D 055 &#45; 46 2E 056 &#46; 47 2F 057 G#47; / 48 30 060 &#48; 0 (backspace) 73 49 111 &#73; I 74 4A 112 &#74; J 10 11 (vertical tab) 12 76 4C 114 &#76; L 77 4D 115 &#77; M 78 4E 116 &#78; N 79 4F 117 &#79; 0 80 50 120 &#80; P 81 51 121 &#81; Q 113 71 161 &#113; q 82 52 122 &#82; R 11472 162 &#114; r 13 (carriage return) (shift out) (shift in) 110 6E 156 &#110; n 1l1 6F 157 &#lll; o 112 70 160 &#112; p 14 15 16 10 020 DLE (data link escape) 17 11 021 Dci (device control 1) 18 12 022 DC2 (device control 2) 19 13 023 DC3 (device contrd 3) 20 14 024 DC4 (device controf 4) 21 15 025 NAK (negative acknowledge) 22 16 026 SYN (synchronous idle) 23 17 027 ETB (end of trans. block) 24 18 030 CAN (cancel) 25 19 031 EM 26 lA 032 SUB (substitute) 27 1B 033 ESC (escape) 28 10 034 FS 29 1D 035 GS 30 IE 036 RS 31 1F 037 US 49 31 061 &#49; 1 50 32 062 &#50; 2 51 33 063 &#51; 3 52 34 064 &#52; 4 53 35 065 &#53; 5 83 53 123 &#83; S 115 73 163 &#115; s 84 54 124 &#84; T 1l6 74 164 &#116; t 85 55 125 &#85; U 117 75 165 &#117; u 86 56 126 &#86; v 118 76 166 &#118; v 54 36 066 &#54; 6 55 37 067 &#55; 7 56 38 070 G#56; 8 87 57 127 &#87; W 119 77 167 &#119; w 88 58 130 &#88; X 120 78 170 &#120; x 89 59 131 &#89; Y 121 79 171 &#121; Y 90 5A 132 &#90; Z 91 5B 133 &#91; [ 92 5C 134 &#92; \ (end of medium) 57 39 071 &#57; 9 58 3A 072 &#58; : 59 3B 073 &#59; ; 60 3C 074 G#60; < 61 3D 075 &#61; = 62 3E 076 &#62; > 63 3F 077 &#63; ? 122 7A 172 &#122; z (file separator) (group separator) (record separator) (unit separator) 123 7B 173 &#123; { 124 7C 174 &#124; | 125 7D 175 &#125; } 126 7E 176 &#126; 127 7F 177 &#127; DEL Source: www.Lookup Tables.com 93 5D 135 &#93; ] 94 5E 136 &#94; * 95 5F 137 &#95;
MAC{ (x) = h(k||x)
m
is called secret prefix MAC, and the second one:
m= MAC&(x) =h(x||k)
Transcribed Image Text:MAC{ (x) = h(k||x) m is called secret prefix MAC, and the second one: m= MAC&(x) =h(x||k)
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 2 images

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY