1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
2 years ago
15

Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found n

o flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.
Computers and Technology
1 answer:
NISA [10]2 years ago
5 0
According to protocol 4.0, the scenario can be defined in terms of Bob, Alice and Trudy as follows:

The communication is done between Bob and Alice only in whom they share a secret key KAB with each other. The Trudy is an intruder who wants to get the information that is being communicated between Alice and Bob. To do so, Trudy wants Bob to initiate the communication by authenticating herself her Alice. Thus, Trudy waits for the Bob to start in-order to make the Bob authenticate himself.

Here are the steps how the communication is done between the Bob and Trudy:

Step 1: Bob starts the communication by himself to other side and waits for the reply.

Step 2: Trudy starts to disguise as Alice herself and authenticate herself to Bob.

Step 3: After looking at the reply, Bob sends the nonce key to Trudy. At this step, still Trudy does not know the KAB(R) in-order to reply to Bob.

Step 4: At this point Trudy response to the step-1 while Bob still continuing to authentication. Trudy picks the nonce for the Bob to encrypt the message with the Bob sent nonce in the Step-3.

Step 5: Now Bob completes his own authentication to himself on the other side of encrypting the nonce he sent at step 4. Where, Trudy gets the nonce key KAB( R).

Step 6: Now, Trudy completes her authentication in responding to R that is sent by Bob in step 3. At this point, Trudy has responded properly, so Bob thinks that he is communicating with Alice(Trudy).

The actual scenario with respect to above steps, the communication is done as follows:

Bob: “I am Bob”

Trudy: “I am Alice”

Bob: “R”

Trudy: “R”

Bob: “KAB (R )” – Bob completes his authentication.

Trudy: Get the KAB (R ) – Trudy complete her authentication.

Thus, the communication is started between the Bob and Trudy instead of Bob and Alice according to protocol 4.0.
You might be interested in
how to create use an array of Course objects instead of individual objects like course 1, course 2, etc
AURORKA [14]

Answer:

To save the course object instances in an array, use;

Course[] courses = new Course[7];

courses[0] = new Course("IT 145");

courses[1] = new Course("IT 200");

courses[2] = new Course("IT 201");

courses[3] = new Course("IT 270");

courses[4] = new Course("IT 315");

courses[5] = new Course("IT 328");

courses[6] = new Course("IT 330");

Explanation:

The java statement above assigns an array of size 7 with the course class constructor, then order courses are assigned to the respective indexes of the new array.

3 0
3 years ago
1. It defines the amount of white space that appears at the top, bottom, left, and right edge of
LekaFEV [45]

Answer:

Margin is the correct answer to the given question .

Explanation:

The main objective of the margin is to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document .

Following are steps to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document

  • Firstly click on the page layout  options  .
  • After that click on the margin tab .In this tab you will given the the top, bottom, left, and right margin according to your need
  • Finally click on ok to finish them .
8 0
3 years ago
What is the memory of a computer called
Nataliya [291]
It is called Ram in another term for memory :)
6 0
3 years ago
Read 2 more answers
Explain Organizational approach to System Analysis and Design
9966 [12]

Answer:

The major goal of systems analysis and design is to improve organizational systems. Often this process involves developing or acquiring application software and training employees to use it. Application software, also called a system, is designed to support a specific organizational function or process, such as inventory management, payroll, or market analysis. The goal of application software is to turn data into information. For example, software developed for the inventory department at a bookstore may keep track of the number of books in stock of the latest best seller. Software for the payroll department may keep track of the changing pay rates of employees. A variety of off-the-shelf application software can be purchased, including WordPerfect, Excel, and PowerPoint. However, off-the-shelf software may not fit the needs of a particular organization, and so the organization must develop its own product.

Explanation:

Information systems analysis and design is a method used by companies ranging from IBM to PepsiCo to Sony to create and maintain information systems that perform basic business functions such as keeping track of customer names and addresses, processing orders, and paying employees. The main goal of systems analysis and design is to improve organizational systems, typically through applying software that can help employees accomplish key business tasks more easily and efficiently. As a systems analyst, you will be at the center of developing this software. The analysis and design of information systems are based on:

Your understanding of the organization’s objectives, structure, and processes

Your knowledge of how to exploit information technology for advantage

7 0
3 years ago
A ribbon is broken into 3 parts - name them. (From Microsoft Word 2016)
BARSIC [14]

Answer:

The Ribbon is composed of three parts: Tabs, Groups, and Commands.

4 0
3 years ago
Other questions:
  • Software that people commonly use in the workplace to make their lives easier is called
    5·1 answer
  • One of the most toxic components of a computer is the
    11·1 answer
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    7·1 answer
  • Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by usi
    8·1 answer
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • Select the correct answer.
    14·2 answers
  • Which skill type refers to the knowledge and ability to perform a task?
    13·2 answers
  • _________ is the primary measurement used to gauge your typing ability
    10·1 answer
  • Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two
    10·1 answer
  • We love silky. she is very honest join this by using conjunction ​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!