Solve the following problem The original three-way authentication procedure for
ID: 3598634 • Letter: S
Question
Solve the following problem The original three-way authentication procedure for X.509 illustrated in Figure 14.6c contains a security flaw. The essence of the protocol is as follows The text of X.509 states that checking timestamps t and tg is optional for three-way authentication. But consider the following example: Suppose A and B have used the preceding protocol on some previous occasion, and that opponent C has intercepted the preceding three messages. In addition, suppose that timestamps are not used and are all set to 0. Finally, suppose C wishes to impersonate A to B. C initially sends the first captured message to B B responds, thinking it is talking to A but is actually talking to C: C meanwhile causes A to initiate authentication with C by some means. As a result, A sends C the following: C responds to A using the same nonce provided to C by B. A responds with This is exactly what C needs to convince B that it is talking to A, so C now repeats the incoming message back out to B. So B will believe it is talking to A whereas it is actually talking to C 1. Suggest a solution to this problem that does not use timestamps. (6 points) 2. Give an argument why your solution is correct. (4 points)Explanation / Answer
package com;
public class ArraySortedPolynomial implements PolynomialInterface
{
ArraySortedPolynomial()
{
}
ArraySortedPolynomial(String pol)
{
}
@Override
public PolynomialInterface add(PolynomialInterface other) {
// TODO Auto-generated method stub
return null;
}
@Override
public PolynomialInterface subtract(PolynomialInterface other) {
// TODO Auto-generated method stub
return null;
}
}
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.