As public-key cryptography is computationally intensive and drains the battery of Barack's device, he comes up with an alternative approach. First, he shares a secret key k with Hillary but not with Bill. Next, together with a joke x, he sends over the value d = h(k||x), where h is a cryptographic hash function. Does value d provide assurance to Hillary that Barack is the author of x and that x

was not modified by Bill? Justify your answer.

What will be an ideal response?


Value d is a message authentication code (MAC), which gives Hillary assurance
of the authorship and integrity of Barack's jokes. The reason is that a cryptographic hash
function is one-way, Bill cannot recover the key k from value d, Thus, Hillary knows that
only Barack could have computed value d from joke x. Also, if Bill replaces joke x with a
joke of his, x0, it would infeasible for Bill to compute the MAC value corresponding to x0.

Computer Science & Information Technology

You might also like to view...

The ____________ is a container that can hold multiple images.

a. Image List control b. Picture Box control c. Panel control d. Bitmap

Computer Science & Information Technology

A(n) ________ file contains a two-column table that is used to mark words as index entries

Fill in the blank(s) with correct word

Computer Science & Information Technology

To make an existing presentation always visible in the Recent Presentations list, click the ____ icon o the right of the filename in the Recent Presentations list.

A. Fix B. Pin C. Permanent D. Always visible

Computer Science & Information Technology

Which of the following is not a type of analysis result given by the Performance Analyzer tool?

A. Ideas B. Suggestions C. Recommendations D. Required

Computer Science & Information Technology