Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The table below shows the authentication protocol, wherein pwd is Albert\'s pass

ID: 3823886 • Letter: T

Question

The table below shows the authentication protocol, wherein pwd is Albert's password and K is a key derived from pwd. Can an attacker that can eavesdrop messages (but not intercept or spoof messages) obtain pwd by off-line password guessing? If you answer no, explain briefly. If you answer yes, describe the attack.

Albert (has pwd)

Bob (has K)

send [conn] to Bob  

generate random challenge Ram

send [Ram]

compute K from pwd

compute A encrypt(Ram) with key K

send [A] to Bob  

compute B decrypt(A) with key K

if B = Ram then Albert is authenticated

Albert (has pwd)

Bob (has K)

send [conn] to Bob  

generate random challenge Ram

send [Ram]

compute K from pwd

compute A encrypt(Ram) with key K

send [A] to Bob  

compute B decrypt(A) with key K

if B = Ram then Albert is authenticated

Explanation / Answer

The whole protocol of authentication shown in the table is the following:

Now let's look at the attacker. It is given that the attacker can only eavesdrop (but can't spoof or intercept anything). So, attacker is able to view only the following two information:

The attacker has to try to obtain the password from the above two pieces of information.

So, attacker has the following two steps to accomplish:

So, even if attacker accomplishes step 1, the next step is almost unlikely to suceed. So, the attacker most probably can't find the pwd by offline guessing.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote