- 3 The Following Figure Shows A Technique For Authentication What Will Happen If The Hash Function Does Not Have A One 1 (356.16 KiB) Viewed 26 times
3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-
3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-way property? What attack could be performed and how? M || compare II M H(MIS) S || H In the figure M is a message, S is a shared secret, || represents concatenation and H is a hash function. 7