1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
10

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key

K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)
Computers and Technology
1 answer:
HACTEHA [7]3 years ago
8 0

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

You might be interested in
Who were 4 major people that attended the constitutional convention
postnew [5]
Alexander Hamilton, George Washington, James Madison, and Benjamin Franklin
7 0
4 years ago
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ____________
vovangra [49]
I believe the answer is in the question, web server. although I may be wrong
3 0
3 years ago
What's the difference between natural systems and man made systems <br>​
Aneli [31]

Answer:

Natural systems are already in place while man made systems were created by humans manipulating things in some way.

Explanation:

man made: human created

natural systems: existed without interference

5 0
3 years ago
Write a program that takes a string as input from the keyboard, representing a year.
Nady [450]
You forgot to mention the language.
7 0
3 years ago
A stretching<br> force causing<br> things to be<br> pulled in<br> opposite<br> directions
tatuchka [14]

Explanation:

Please helpppp meee! I'm rn in Ukraine, the invasion has begun early this morning! My house was bombed by a russian shell. I'm hurt!!! Give me some advice!! I don't have any medical substances nearby!!

4 0
2 years ago
Other questions:
  • Variables defined inside a member function of a class have: Block scope. Class or block scope, depending on whether the binary s
    5·1 answer
  • software that instructs the computer how to run applications and controls the display/keyboard is known as the
    11·1 answer
  • Which of the following is a sigh that your computer may have been infected with malicious code
    12·1 answer
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • Design a hierarchy of classes, where the Media superclass has the artistName and the mediaName as the common attributes. Create
    14·1 answer
  • In an MLA style citation for an image, what information should be listed first? A. The name of the creator B. The title of the i
    8·2 answers
  • Why is it useful for students to practice the MLA and APA citation methods?
    15·1 answer
  • What Is entered into the system as input?
    13·1 answer
  • Juan has performed a search on his inbox and would like to ensure the results only include those items with attachments which co
    14·2 answers
  • What are the local, state, and national opportunities that may be available to those who participate in CTSOs?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!