Problem 5 Cryptographic Hash Functions Alice Wants Monitor Changes Files Computer Uses Hma Q37233002

Problem 5: Cryptographic Hash Functions Alice wants to monitor changes to all files on her computer. She uses HMAC and append

Problem 5: Cryptographic Hash Functions Alice wants to monitor changes to all files on her computer. She uses HMAC and appends HMACn HMAC(k, file namenlfile contentn) to each file n. She updates this value for every change she makes to each file. Explain how an attacker (Eve) can make the following changes without being detected by Alice. 1. Content of one of Alice’s files has changed. 2. One of Alice’s file has been deleted 3. A

OR
OR

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.