1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
2 years ago
15

Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found n

o flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.
Computers and Technology
1 answer:
NISA [10]2 years ago
5 0
According to protocol 4.0, the scenario can be defined in terms of Bob, Alice and Trudy as follows:

The communication is done between Bob and Alice only in whom they share a secret key KAB with each other. The Trudy is an intruder who wants to get the information that is being communicated between Alice and Bob. To do so, Trudy wants Bob to initiate the communication by authenticating herself her Alice. Thus, Trudy waits for the Bob to start in-order to make the Bob authenticate himself.

Here are the steps how the communication is done between the Bob and Trudy:

Step 1: Bob starts the communication by himself to other side and waits for the reply.

Step 2: Trudy starts to disguise as Alice herself and authenticate herself to Bob.

Step 3: After looking at the reply, Bob sends the nonce key to Trudy. At this step, still Trudy does not know the KAB(R) in-order to reply to Bob.

Step 4: At this point Trudy response to the step-1 while Bob still continuing to authentication. Trudy picks the nonce for the Bob to encrypt the message with the Bob sent nonce in the Step-3.

Step 5: Now Bob completes his own authentication to himself on the other side of encrypting the nonce he sent at step 4. Where, Trudy gets the nonce key KAB( R).

Step 6: Now, Trudy completes her authentication in responding to R that is sent by Bob in step 3. At this point, Trudy has responded properly, so Bob thinks that he is communicating with Alice(Trudy).

The actual scenario with respect to above steps, the communication is done as follows:

Bob: “I am Bob”

Trudy: “I am Alice”

Bob: “R”

Trudy: “R”

Bob: “KAB (R )” – Bob completes his authentication.

Trudy: Get the KAB (R ) – Trudy complete her authentication.

Thus, the communication is started between the Bob and Trudy instead of Bob and Alice according to protocol 4.0.
You might be interested in
Working together, printer A and printer B would finish the task in 24 minutes. Printer A alone would finish the task in 60 minut
sasho [114]

Answer:

The correct answer to this question is option (1).

Explanation:

Let x1 = Is number of pages that printer A can print  in page/minute.  

thus x1 + 5 = Is number of page that printer B can print in page/minute.  

As printer A finishes his work in 60 min. So the task has 60x1 pages. As printers A and B both finish that task in 24 minutes. So the equation can be given as:  

60x1 = 24x1 + 24(x1 + 5)  

 

60x1 = 24x1 + 24x1 + 120  

 

60x1=48x1 + 120

 

60x1-48x1=120

 

12x1=120  

 

x1=120/12

 

x1=10

put the value of x1 in to (60x1). Therefore, the task has 60(10) = 600 pages. the task contains 600 pages.  

So the answer to this question is option (1).

7 0
3 years ago
Can you anyone please help me​
Yuliya22 [10]

Answer:

Option C I think

3 0
2 years ago
Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
astraxan [27]
It will be elisa who will get to it
3 0
3 years ago
Read 2 more answers
State one advantage of organising data into columns and rows
Bezzdna [24]
It's neat organized and ready to find when needed
6 0
3 years ago
Please help. 10 points
pickupchik [31]

Answer:

God Is Good He Will Always Help You He Is Good And Always Good!!

If God Is For Us Who Can Be Against us?? Romans 8:31

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • When purchasing a(n) ________ computer, having cellular as well as wifi can be important?
    9·1 answer
  • In the written Hawaiian language, only 13 letters are used: the five vowels (a,e,i,o, and u), and 8 consonants (h,k,l,m,n,p,w, a
    10·1 answer
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
  • Which would you trade on a stock exchange? A: Shares B: Bonds C: Annuities
    6·2 answers
  • Users of Adobe Reader, created by Adobe Systems Incorporated, are prompted to provide feedback on their experiences with the sof
    7·1 answer
  • A computer consists of both software and hardware. a)Define the term software​
    5·1 answer
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • For each obstacle, select the best solution. failing to find other members for a club: failing a class: failing to get the credi
    9·2 answers
  • It is a data being transported on a network​
    13·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!