Computer Science. cryptology Please answer each and label each answer by alphabe
ID: 3828241 • Letter: C
Question
Computer Science. cryptology Please answer each and label each answer by alphabet A. Explain precisely how and where Alice is authenticated. What prevents a replay attack? B. If Trudy is a passive attacker (i.e., she can only observe messages), she cannot determine the key K. Why? C. Show that if Trudy is an active attacker (i.e., she can actively send messages) and she can impersonate Bob, then she can determine the key K that Alice uses in the last message. Explain why this does not break the protocol. d. What is the purpose of the encrypting the final message with the key K?Explanation / Answer
A)In SSH method private key is attached with the alice method and public key is provided.
The alice is authenticated in the bob side after getting the message and keys,to authenticate we need proivatekey,public key and it uses the authentication protocol.
B)She can find message only she cannot know the private and public key so private key is known we can find public key and wiseversa.
C)Trudy is a passive attacker,then she cannot determine the key,because we are using two keys private and public,.she can find only messages and private key.public key is visible to everyone it not secret.so vprivate key should be secreted one,because it need to find the public key.trudy can find public key but she cannot find private key.if she can find private key she cannot know how to find public key from privaten ,because mathematical formule used here.
d)The message after encrypted it needs key K,because obtain the high level security.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.