Question: Suppose Alice uses the NeedhamSchroeder authentication protocol to initiate a session with Bob. Further suppose that an adversary is able to eavesdrop on the authentication
Suppose Alice uses the Needham–Schroeder authentication protocol to initiate a session with Bob. Further suppose that an adversary is able to eavesdrop on the authentication messages and, long after the session has completed, discover the (unencrypted) session key. How could the adversary deceive Bob into authenticating the adversary as Alice?
Step by Step Solution
3.45 Rating (155 Votes )
There are 3 Steps involved in it
The NeedhamSchroeder Authentication Protocol is used primarily for verifying the identity of a remot... View full answer
Get step-by-step solutions from verified subject matter experts
