Block size = 4 bits Hash size = 4 bits Encryption function: Divide the key into two halves: LK and RK; Divide the plaintext into two halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT; where LC, RC, LT, and RT are each 2 bits; Plaintext and ciphertext are each 4 bits. g(H) = a 4-bit string that is equal to the complement of bits in H; For example, if H=A (Hexa) = 1010 (binary); then g(H)= 0101 H0 = Initial hash = A (in Hexa) Given message M:  F1 (in Hexa); Q4a.  Determine the hash (in hexadecimal) of the message M using Martyas-Meyer-Oseas hash function (Fig. 11.6).    Q4b.  Determine the hash (in hexadecimal) of the message M using Davis-Meyer hash function (Fig. 11.7)   Q4c.  Determine the hash (in hexadecimal) of the message M using Migayuchi-Preneel hash function (Fig. 11.7)

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
  • Block size = 4 bits
  • Hash size = 4 bits
  • Encryption function: Divide the key into two halves: LK and RK; Divide the plaintext into two halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT; where LC, RC, LT, and RT are each 2 bits; Plaintext and ciphertext are each 4 bits.
  • g(H) = a 4-bit string that is equal to the complement of bits in H; For example, if H=A (Hexa) = 1010 (binary); then g(H)= 0101
  • H0 = Initial hash = A (in Hexa)
  • Given message M:  F1 (in Hexa);
Q4a.  Determine the hash (in hexadecimal) of the message M using Martyas-Meyer-Oseas hash function (Fig. 11.6). 
 
Q4b.  Determine the hash (in hexadecimal) of the message M using Davis-Meyer hash function (Fig. 11.7)
 
Q4c.  Determine the hash (in hexadecimal) of the message M using Migayuchi-Preneel hash function (Fig. 11.7)
Hj-1
eigggen
Hj-1
m
Hi
Hị
Fig. 11.7 Davies-Meyer (left) and Miyaguchi-Preneel hash function constructions from block
ciphers
Transcribed Image Text:Hj-1 eigggen Hj-1 m Hi Hị Fig. 11.7 Davies-Meyer (left) and Miyaguchi-Preneel hash function constructions from block ciphers
X1 -.. Xn
b.
H-1
Hị
Fig. 11.6 The Matyas-Meyer-Oseas hash function construction from block ciphers
Transcribed Image Text:X1 -.. Xn b. H-1 Hị Fig. 11.6 The Matyas-Meyer-Oseas hash function construction from block ciphers
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education