Attack Explanation
The MAC scheme splits each message in half and creates separate tags for each half.
This vulnerability allows an attacker to combine the first half of one message with
the second half of another, and the corresponding tag halves will still verify correctly.