Problem 5 Cryptographic Hash Functions Alice Wants Monitor Changes Files Computer Uses Hma Q37197331

Problem 5: Cryptographic Hash Functions Alice wants to monitor changes to all files on her computer. She uses HMAC and append

Problem 5: Cryptographic Hash Functions Alice wants to monitor changes to all files on her computer. She uses HMAC and appends HMACHMAC(k, file-namenfile -contentn) to each file n. She updates this value for every change she makes to each file. Explain how an attacker (Eve) can make the following changes without being detected by Alice 1. Content of one of Alice’s files has changed 2. One of Alice’s file has been deleted 3. A new file

OR
OR

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.