Page 1 of 1

3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-

Posted: Thu May 26, 2022 9:44 am
by answerhappygod
3 The Following Figure Shows A Technique For Authentication What Will Happen If The Hash Function Does Not Have A One 1
3 The Following Figure Shows A Technique For Authentication What Will Happen If The Hash Function Does Not Have A One 1 (356.16 KiB) Viewed 28 times
3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-way property? What attack could be performed and how? M || compare II M H(MIS) S || H In the figure M is a message, S is a shared secret, || represents concatenation and H is a hash function. 7