The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 399 Weeks Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
Q. Consider the following method that establishes a secret session key k for use by Alice and Bob. Alice and Bob already share a secret key Kab for encryption.
i) Alice sends a random value NA to Bob along with her id, A.
ii) Bob sends encrypted message EKab(NA), NB to Alice, where NB is a random value
chosen by Bob.
iii) Alice sends back EKab(NB).
iv) Bob generates session key k and sends EKab(k) to Alice.
v) Now Alice and Bob exchange messages encrypted with the new session key
k.
Suppose that the random values and the keys have the same number of bits.
Describe a possible attack for this authentication method. Can we make the
method more secure by lifting the assumption that the random values and the
keys have the same number of bits? Explain.
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll