Consider our authentication protocol in this figure in which Alice authenticates
ID: 3619614 • Letter: C
Question
Consider our authentication protocol in this figure in which Alice authenticates herself to Bob, which we saw works well (i.e. we found no flaws in it). Now suppose that while Alice authenticating herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, an now authenticate herself to Bob as Alice. (Hint: Consider that the sequence of operations of the protocol, one with Trudy initiating and one with Bob initiating, can be arbitrarily interleaved. Pay particular attention to the fact that both Bob and Alice will use a nonce, and that if care is not taken, the same nonce can be used maliciously.)Explanation / Answer
Consider our authentication protocol in this figure in which Alice authenticates
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.