The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 398 Weeks Ago, 3 Days Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
Consider the following protocol, designed to let A and B decide on a fresh, sharedsession key K‘AB
AB  .We assume that they already share a long-term key KAB.
1. A→B:A, NA.
2. B: A→E(KAB, [NA, K’AB])
3. A→ B:E(K’AB, NA)
a. We first try to understand the protocol designer’s reasoning:
—Why would A and B believe after the protocol ran that they share with the K’AB other party?
—Why would they believe that this shared key is fresh?In both cases, you should explain both the reasons of both A and B, so youranswer should complete the sentences
A believes that she shares K’ABwith B since...
B believes that he shares K’AB with A since...
A believes that K’ ABis fresh since...
B believes that K’ ABis fresh since...
b. Assume now that A starts a run of this protocol with B. However, the connectionis intercepted by the adversary C. Show how C can start a new run of the protocolusing reflection, causing A to believe that she has agreed on a fresh key with B (inspite of the fact that she has only been communicating with C).Thus, in particular,the belief in (a) is false.
c. Propose a modification of the protocol that prevents this attack.
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll