As public-key cryptography is computationally intensive and drains the battery of Barack's device, he comes up with an alternative approach. First, he shares a secret key k with Hillary but not with Bill. Next, together with a joke x, he sends over the value d = h(k||x), where h is a cryptographic hash function. Does value d provide assurance to Hillary that Barack is the author of x and that x
was not modified by Bill? Justify your answer.
What will be an ideal response?
Value d is a message authentication code (MAC), which gives Hillary assurance
of the authorship and integrity of Barack's jokes. The reason is that a cryptographic hash
function is one-way, Bill cannot recover the key k from value d, Thus, Hillary knows that
only Barack could have computed value d from joke x. Also, if Bill replaces joke x with a
joke of his, x0, it would infeasible for Bill to compute the MAC value corresponding to x0.
You might also like to view...
The ____________ is a container that can hold multiple images.
a. Image List control b. Picture Box control c. Panel control d. Bitmap
A(n) ________ file contains a two-column table that is used to mark words as index entries
Fill in the blank(s) with correct word
To make an existing presentation always visible in the Recent Presentations list, click the ____ icon o the right of the filename in the Recent Presentations list.
A. Fix B. Pin C. Permanent D. Always visible
Which of the following is not a type of analysis result given by the Performance Analyzer tool?
A. Ideas B. Suggestions C. Recommendations D. Required