1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
2 years ago
10

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key

K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)
Computers and Technology
1 answer:
HACTEHA [7]2 years ago
8 0

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

You might be interested in
Most Microsoft Windows fatal errors (blue screen of death) are caused by:
rusak2 [61]

Answer:D) Hardware failure

Explanation: Fatal error are those which stops the function execution of the operating system during the run-time in the Microsoft Windows . These errors. These errors are seen the Microsoft windows due to the major reason of the hardware failure, accessing of the invalid code,operating system files might get corrupted etc. Therefore, the correct option is option(D).

7 0
2 years ago
Is windows CUI operating system??<br><br><br>What is the main purpose of folder ????<br><br><br>​
Likurg_2 [28]
Answer: yes and main purpose of folder can help in storing and organizing files and data in the computer.

Hope this helped!
8 0
2 years ago
Difference between multiterm access and single term access for webassign
NemiM [27]

The difference between single term access and multi term access is that multi-term access is for more than one term to courses using the same textbook edition and the Single term access<span> lasts for the duration of a Single  course in Web Assign. </span>

Multi-term access is also known as "Lifetime of Edition"

<span />
4 0
3 years ago
Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
topjm [15]

Answer:

class PersonInfo:

   def __init__(self):

       self.num_kids = 0

   def inc_num_kids(self):

       self.num_kids += 1

person1 = PersonInfo()

print('Kids:', person1.num_kids)

person1.inc_num_kids()

print('New baby, kids now:', person1.num_kids)

Explanation:

Line 1 of the code, we define the class PersonInfo. Line 3 of the code is the function that will increment the member data num_kids.

4 0
3 years ago
find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
kolbaska11 [484]

Answer:

select style_name,br.name as brewery,count(beer_id) as Num

from beerdb.beers be  

inner join beerdb.styles st

on be.style_id = st.style_id

join beerdb.breweries br on  

be.brewery_id = br.brewery_id

group by style_name , br.name  

having count(beer_id)>=10

order by style_name, num desc

Explanation:

7 0
3 years ago
Other questions:
  • Trisha is looking for a new table style. What is the fastest way for her to preview how different styles in the gallery would lo
    13·1 answer
  • Do you like PC? Why? (I need your opinion for research)
    10·2 answers
  • How to do pseudocode and flowchart in BMI ( computer programming ​
    11·1 answer
  • Some computer engineering students decided to revise the LC-3 for their senior project. In designing the LC-4, they decided to c
    13·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • The Telecommunications Act of 1996 was a mixed bag for cable customers. Although cable companies argued that it would bring more
    8·1 answer
  • ___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
    8·1 answer
  • Ann needs to share information about a new hiring policy. She needs to communicate this information to more than one hundred emp
    15·2 answers
  • Coding 5 - Classes The Item class is defined for you. See the bottom of the file to see how we will run the code. Define a class
    13·1 answer
  • What is a cpu in full explanation?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!