
Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
When a MAC (message authentication code) is used, what happens if an attacker attempts to tamper with the Tag (the MAC) and the ciphertext while in transit? Provide an explanation for why this attack can never succeed since the target's ability to detect a tampered Tag/ciphertext guarantees success.
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 2 steps

Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- An attack on a network may be the result of rerouting malicious traffic from one virtual private network to another. An attacker's attack pattern must be figured out before any defence can be implemented. Give an example of a careful measure that comes to mind.arrow_forwardWhat does a poison packet assault entail? Give two examples of this type of assault.arrow_forwardNeed the below questions answered: 1) Suppose that a merchant’s website stores hashed passwords that have not been salted. Describe an attack to obtain passwords that could be prevented using salted passwords. (Remember, hashes cannot be "decrypted") 2) You know that it is generally not a good practice to create your own authentication systems when standard packages are available to you. But for the purposes of learning, you are doing it anyway. You are trying to decide which hashing algorithm to use when salting and hashing user passwords for the webapp you are building. Of the following hashing algorithms, which is best for hashing passwords? What makes your choice the best option for this scenario? SHA512 MD5 Bcrypt SHA256 3) There are several options for password hashing algorithms other than your choice from above. Do a little Internet investigation and discuss an equivalent or better option than your previous choice. Are there any parameters or settings to that algorithm…arrow_forward
- 7. Consider a one-way authentication technique based on asymmetric encryption: A→B: IDA BA: E(PU, R₂) A-B: R₂ a. Explain the protocol. b. What type of attack is this protocol susceptible to?arrow_forwardIs the term "poison packet attack" familiar to you? Provide evidence for your claim using specific instances.arrow_forwardGive some examples of the many means through which a session may be taken over by an attacker. The question is how one would protect oneself against such an attack.arrow_forward
- How are different attacks on message authentication prevented and how are they prevented?arrow_forwardBecause of the similarities between network sniffing and wiretapping, which do you prefer? Is there anything about them that causes them to be considered silent threats?arrow_forwardSuppose a user employs one-time passwords as above (or, for that matter, reusable passwords), but that the password is transmitted sufficiently slowly. (a) Show that an eavesdropper can gain access to the remote server with a relatively modest number of guesses. (Hint: The eavesdropper starts guessing after the original user has typed all but one character of the password.) (b) To what other attacks might a user of one-time passwords be subject?arrow_forward
- Either the PAP or CHAP protocol may be used to set up PPP authentication. Which approach provides the best possible degree of protection? It is necessary for you to provide an explanation for the answer you provided.arrow_forwardIn a two-factor authentication system using both private and public keys, who should have access to the private key?arrow_forwardGive some examples of the many means through which a session may be taken over by an attacker. The question is how one would protect oneself against such an attack.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education