30. Consider the authentication protocol below, which is based on knowledge of a
ID: 3691213 • Letter: 3
Question
30. Consider the authentication protocol below, which is based on knowledge of a shared 4-digit PIN number. Here, -KpiN = h(PIN). Suppose that Trudy passively observes one iteration of the protocol. Can she then determine the 4-digit PIN? Justify your answer.
30. Consider the authentication protocol below, which is based on know edge of a shared 4-digit PIN number. Here, KPIN h(PIN). I'm Alice, E(RA,KPIN) E(RA.RB,KPIN) E(Rg.KP) Alice PIN Bob PIN Suppose that Trudy passively observes one iteration of the protocol. Can she then determine the 4-digit PIN? Justify your answer.Explanation / Answer
No, Trudy can’t get the key, because it is never seen unencrypted with other values making it secure. Perhaps Trudy could retrieve the key using brute force but this is for the most part secure.
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.