Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
What happens if an attacker tries to tamper with the Tag (the MAC) and the ciphertext while they are in transit when a message authentication code (MAC) is being used? Give an explanation as to why this attack can never be successful, given that the ability of the target to identify a tampered Tag/ciphertext ensures that it will succeed every time.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Need the below questions answered: 1) Suppose that a merchant’s website stores hashed passwords that have not been salted. Describe an attack to obtain passwords that could be prevented using salted passwords. (Remember, hashes cannot be "decrypted") 2) You know that it is generally not a good practice to create your own authentication systems when standard packages are available to you. But for the purposes of learning, you are doing it anyway. You are trying to decide which hashing algorithm to use when salting and hashing user passwords for the webapp you are building. Of the following hashing algorithms, which is best for hashing passwords? What makes your choice the best option for this scenario? SHA512 MD5 Bcrypt SHA256 3) There are several options for password hashing algorithms other than your choice from above. Do a little Internet investigation and discuss an equivalent or better option than your previous choice. Are there any parameters or settings to that algorithm…arrow_forwardIs it possible to alter the Tag (the MAC) and the ciphertext while they are in transit using a MAC (message authentication code)? The receiver can always identify a changed Tag/ciphertext in this attack, therefore explain why it will not succeed.arrow_forwardThe attacker uses the MAC to try to alter the Tag (the encrypted message) (message authentication code). Exactly what are the potential outcomes if I do this? If this attack succeeds, the target will always be able to spot a tampered Tag or ciphertext.arrow_forward
- Is it feasible to modify the Tag (the MAC) and the ciphertext using a MAC (message authentication code) while they are in transit? In this attack, the receiver can always recognize a modified Tag/ciphertext; thus, explain why it cannot succeed.arrow_forwardChanging either the tag or the MAC will allow an adversary to decode the ciphertext (message authentication code). Can you see any potential problems with this plan? If this attack is effective, the target may be able to decipher a ciphertext that has been altered from the original Tag.arrow_forwardWhat happens if an attacker attempts to alter the Tag (the MAC) and the ciphertext when a message authentication code (MAC) is being used? Describe why a successful attack like this would never be possible since the recipient might detect a changed tag or ciphertext.arrow_forward
- What happens if an attacker attempts to alter the Tag (the MAC) and ciphertext while the message is in transit? What happens? Let us know how and why this attack will fail; that is, we must show how and why this receiver will always recognize that the tag has been changed.arrow_forwardChanging the tag or MAC allows an attacker to decipher the ciphertext (message authentication code). Any issues with this plan? If this attack works, the victim may be able to decrypt a Tag-altered ciphertext.arrow_forwardIs it possible for a message authentication code to change the Tag or the ciphertext while it is in transit? Recipients will always be able to detect a tampered Tag/ciphertext, rendering this attack futile.arrow_forward
- Is it feasible to modify the Tag (the MAC) and the ciphertext using a MAC (message authentication code) while they are in transit? In this attack, the receiver can always recognize a modified Tag/ciphertext; thus, explain why it cannot succeed.arrow_forwardWhen a MAC (message authentication code) is used, what happens if an attacker attempts to tamper with the Tag (the MAC) and the ciphertext while in transit? Provide an explanation for why this attack can never succeed since the target's ability to detect a tampered Tag/ciphertext guarantees success.arrow_forwardGive some examples of the many means through which a session may be taken over by an attacker. The question is how one would protect oneself against such an attack.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education