EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem R11RQ
Program Plan Intro

Hash Function:

Any function that can be used to map data of arbitrary size to data of a fixed size is called a hash function.

Hash functions provide message integrity as it is computationally infeasible to find any two messages with the same hash.

Hashing:

Hashing is a data structure technique that is used to index and retrieve items in a database.

Given information:

In a Message Authentication Code (MAC), the sender sends (m,H(m)+ s) , where H (m) + s is the concatenation of H (m) and s.

Blurred answer
Students have asked these similar questions
Msg3. B→A : B, N1, Ks, Message2, h(B, N1, Message2)   Whereas: h(m) represents the digest of the message (m). {m}{K} represents the encryption of message (m) using the key (K) PK is public key N1 is a random number. 1. What are the main problems in Msg3?
Alice and Bob decided to use HMAC to authenticate the communication between them. They already share a key k for the MAC scheme. To sign a message M (which is always of an even bit length), the sender parses the message as M=M_L||M_R, i.e. the message is parsed as a left half and a right half (both halves have equal length), then the sender computes X-M₁MR (where denotes XOR). The sender then sends M and T=HMACK(X) to the other party. Does this construction provide existential unforgeability? Yes No
The function f(R, K) = P(S(E(R XOR K)) of the DES cryptographic protocol manipulates different sizes of bit-strings. The bit-string sizes of P-SEK in this order are: 32-48-48-32 32-32-48 48 48-48-32-32 64-32-32 48 64 48 32-64 SAVE
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education