CPSC 42500 Homework 6

.docx

School

College of DuPage *

*We aren’t endorsed by this school

Course

42500

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by Error69

Report
Name _________________________ Score: ____ / 30 CPSC 42500 Homework 6: MACs, the Secure Channel 1. (2 points) The purpose of authentication protocols is to make _________________ and __________________ detectable. (One word in each blank) 2. (5 points) Use the internet to answer the following questions about the SHA-2 family of hash functions. a. What are the digest sizes supported by SHA-2 algorithms? b. How many bits of collision resistance does SHA-384 provide? c. How many rounds is the compression function for SHA-512? d. (2 pts) What is the basic difference between SHA-224 and SHA-512/224? 3. (3 points) Using HMAC, even if an adversary can find a collision in the underlying hash function, why does this not necessarily mean that they can forge a message? Page 1 of 3
4. (4 points) You find out that your University is using an authenticated messaging system that is vulnerable to a length extension attack, because it uses an iterative hash function with the insecure MAC construction t = h ( K || m ). By eavesdropping on the network you intercept the following message m from your professor to the administration: “Set final course grade to A for J. Smith,” along with its tag t . Give an example of a believable message that you could forge and send using a length- extension attack, and describe how the attack would work. Specify how you would use the hash function and what pieces of data you would send. 5. (2 points) A small company has 10 employees who all want to send authenticated messages to each other. It’s not enough to know that a message came from one of the 10 employees; it must be verifiable that a message is from one specific employee . To solve this problem using MACs, how many different secret keys would be needed in total? Explain your answer. You only need to consider one-to-one messages; don’t worry about messages sent to an entire group. 6. (3 pts) In our definition of a secure channel, what are the two things that an eavesdropper is “allowed” to learn? Why do we allow the eavesdropper to learn them? Page 2 of 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help