1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
10

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key

K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)
Computers and Technology
1 answer:
HACTEHA [7]3 years ago
8 0

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

You might be interested in
Rickie gets a message from the school’s tech support department. Their computer is supposed to be running the latest system soft
raketka [301]

Answer:

the operating system or web browser

6 0
3 years ago
Read 2 more answers
If you are in a tornado situation which of the following should you NOT do?
Hunter-Best [27]
Three. A bridge can be put under immense pressure during a storm. In addition to that if a tornado has caused a storm surge the rising water could make you drown
5 0
3 years ago
CORONAAAAAAAAAAA SUUUUUUUCKSSSSSSS
likoan [24]

Periodddddddddddddddddd

7 0
3 years ago
Read 2 more answers
A potential customer wants to find out how blockchain can benefit their company and why they should use Accenture’s Multi-party
grandymaker [24]

Answer:

maybe blockchain can help them in term of security

6 0
3 years ago
What is a Type 10 SD card?
Semmy [17]

Answer: Class 10 refers to the read write speed of a memory card

Explanation:

5 0
1 year ago
Other questions:
  • Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add
    9·1 answer
  • A (blank) is a way for students to keep track of information during research
    7·2 answers
  • How do I change the year I was born on this website? I made a mistake and now I can't fix it. Can somebody please help me?
    5·1 answer
  • The presentation layer describes the layer where computers interact with _____
    8·2 answers
  • What information is displayed in the title bar?
    10·1 answer
  • In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web se
    12·1 answer
  • List five applications field of a computer?​
    8·1 answer
  • Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
    15·2 answers
  • Read each example from the opening of a speech on the topic of video gaming. Identify the type of hook being used According to a
    6·1 answer
  • What Two external audio recorders are most commonly used ??
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!