1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
2 years ago
15

Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found n

o flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.
Computers and Technology
1 answer:
NISA [10]2 years ago
5 0
According to protocol 4.0, the scenario can be defined in terms of Bob, Alice and Trudy as follows:

The communication is done between Bob and Alice only in whom they share a secret key KAB with each other. The Trudy is an intruder who wants to get the information that is being communicated between Alice and Bob. To do so, Trudy wants Bob to initiate the communication by authenticating herself her Alice. Thus, Trudy waits for the Bob to start in-order to make the Bob authenticate himself.

Here are the steps how the communication is done between the Bob and Trudy:

Step 1: Bob starts the communication by himself to other side and waits for the reply.

Step 2: Trudy starts to disguise as Alice herself and authenticate herself to Bob.

Step 3: After looking at the reply, Bob sends the nonce key to Trudy. At this step, still Trudy does not know the KAB(R) in-order to reply to Bob.

Step 4: At this point Trudy response to the step-1 while Bob still continuing to authentication. Trudy picks the nonce for the Bob to encrypt the message with the Bob sent nonce in the Step-3.

Step 5: Now Bob completes his own authentication to himself on the other side of encrypting the nonce he sent at step 4. Where, Trudy gets the nonce key KAB( R).

Step 6: Now, Trudy completes her authentication in responding to R that is sent by Bob in step 3. At this point, Trudy has responded properly, so Bob thinks that he is communicating with Alice(Trudy).

The actual scenario with respect to above steps, the communication is done as follows:

Bob: “I am Bob”

Trudy: “I am Alice”

Bob: “R”

Trudy: “R”

Bob: “KAB (R )” – Bob completes his authentication.

Trudy: Get the KAB (R ) – Trudy complete her authentication.

Thus, the communication is started between the Bob and Trudy instead of Bob and Alice according to protocol 4.0.
You might be interested in
Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
patriot [66]

Answer:

d. Task View

Explanation:

Based on the scenario being described within the question it can be said that the best feature for this would be the Windows 10 task view. This is a task switcher and  virtual desktop system included in the Windows 10 operating system, and allow the individual user to quickly locate, manage, open or hide different windows/tasks. Such as having several projects open in different monitors running at the same time.

3 0
4 years ago
Which event occurs when the user clicks on an html element?
svet-max [94.6K]
Javascript can be executed i believe. but i just googled it,check it for yourself
8 0
3 years ago
How to double print ona printer that doesnt allow t
just olya [345]
You could print one side, flip the paper over and then print what you wanted on the other side.
8 0
4 years ago
You are about to repair and change the resistor (small components),but the components are too small to solder and hold,what tool
exis [7]

Answer:

Needle-nose pliers

Explanation:

Required

Tool used to hold small components

The device to do this is the needle nose pliers.

This device has several functions, but it is specifically designed to hold small components in the computer when the computer is being repaired.

Among the other functions are:

  • Picking small and tiny screws
  • Cutting of wires
  • Hold wires against the side of the computer case
8 0
3 years ago
Jessica is working on a report for her art history class. She is using Microsoft Word for her report so that she can incorporate
Lana71 [14]

Answer:

Clicking the F4 button

Explanation:

The function keys or F keys are in most cases lined along the top of the keyboard and labeled F1 through F12. These keys act as shortcuts, performing certain functions.

The F4 button is a quick way to repeat the last command /action carried out.

For Jessica to continue applying this same style to additional headers, all she needs to do is click the Function Button F4 at the new location where she wants to apply Heading 1 Quick Style.

Other functions of the F4 button are:

  • Alt+F4 closes the program window currently active in Microsoft Windows.
  • Ctrl+F4 closes the open window or tab in the active window in Microsoft Windows.
8 0
3 years ago
Read 2 more answers
Other questions:
  • How do you think engel would feel about computers information systems and the internet?
    14·2 answers
  • Which career field has grown most as a result of technological changes?
    13·1 answer
  • What effect does the interconnectedness of modern media have on society?
    14·2 answers
  • A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.
    9·1 answer
  • What is a Forloop and what is it used for?
    7·2 answers
  • The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False
    14·1 answer
  • Is the practice of downloading and distributing copyrighted content digitally without permission??
    14·1 answer
  • Examples of structures that can store homogeneous data element​
    14·1 answer
  • You are given an integer N where 0 <= N <= 100, followed by another line of input which has a word W with length L where 1
    6·1 answer
  • What is the factor of 200
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!