1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
10

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key

K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)
Computers and Technology
1 answer:
HACTEHA [7]3 years ago
8 0

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

You might be interested in
Select the correct answer from each drop-down menu.
otez555 [7]

the global posting system is funded by the department of Defense

3 0
3 years ago
Read 2 more answers
What is output unit of a computer system?​
mixas84 [53]

Answer: The third and final component of a computer system is the output unit. After processing of data, it is converted into a format which humans can understand. After conversion, the output units displays this data to users. Examples of output devices include monitors, screens, printers and speakers.

Explanation:

4 0
3 years ago
Python1. Assume that name is a variable of type String that has been assigned a value. Write an expression whose value is a Stri
suter [353]

Answer:

Expression for 1st option:

last_character=name[len(name)-1]

print(last_character)

Expression for 2rd option:

length_of_the_string=len(sentence)

print(length_of_the_string)

            or

length=0

for x in sentence:

   length=length+1

print(length)

Expression for 3rd option:

last_character=name[len(name)-1]

print(last_character)

Explanation:

  • The first and the third questions option are same, so the answer to those options are also the same.
  • The len function is used in python which is used to find the length of the string.
  • The user can also find the string length by the help second option which is written in option 2 answers. It uses a for loop which scans the character and counts the length.
  • The len function defines the length and if any user needs to print the last character then he can do it with the help of string size -1.
  • It is because the string is a collection of character array which index starts from 0 and ends in size-1.
3 0
4 years ago
What does XD mean? I keep seeing people say it and I dont know what it means
Anna007 [38]

Answer: xD = haha

Explanation:

XD looks like a haha face laughing :P

have a good day :)

6 0
3 years ago
Read 2 more answers
Nnbnnb dfhhfhfbhfbhdffd<br> ddbhfbhdhfbhdhf<br> hhffudjbfbjkd<br> dbhdfbhbfhdb
saveliy_v [14]
Tahheuend
Thatgeheh
Thahyateg
Fascinating
:)
6 0
3 years ago
Other questions:
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • If someone were unable to pay cash right now, which financing option would be best for the laptop and for the refrigerator?
    10·2 answers
  • If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
    9·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    5·1 answer
  • You wish to enter your exam scores in a spreadsheet. Which function will help you find how each subject’s score relates to the o
    15·2 answers
  • Which audio media can be directly sent to the subscribers through an RSS feed?
    6·1 answer
  • Peer collaboration helps develop critical-thinking skills, which is the ability to
    9·2 answers
  • Analyze the sentence below . choose your answer on the box below write your answer in your quiz notebook
    5·1 answer
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!