Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate

ID: 3561808 • Letter: S

Question

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each
other. If they all used the same secret key K, then Bob could impersonate Carol to Alice
(actually any of the three can impersonate the other to the third). Suppose instead that
each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This
means that each one, to prove his or her identity, responds to a challenge with a function
of his or her secret key and the challenge. Is this more secure than having them all use the
same secret key K? (Hint: what does Alice need to know in order to verify Carol

Explanation / Answer

No more secure than pervious one.


Reason: Alice need to know the secret key of Carol to verify the Carol’s answer to Alice challenge similarly it need the secret key of Bob to verify the Bob’s answer to Alice challenge (actually any of the three need others secret key for verify answer to challenge).


So, Bob could impersonate Carol to Alice as it should know the secret key of Carol to answer Carol challenge. Hence it is no more secure than having all use the same secret key.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote