3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-
Posted: Thu May 26, 2022 9:44 am
3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-way property? What attack could be performed and how? M || compare II M H(MIS) S || H In the figure M is a message, S is a shared secret, || represents concatenation and H is a hash function. 7