Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3 Digital signatures a. Digital signatures are sometimes used for authenticating users in network protocols. SSH and TLS, for example, can both use such a

image text in transcribed

3 Digital signatures a. Digital signatures are sometimes used for authenticating users in network protocols. SSH and TLS, for example, can both use such a echanism. Consider the following protocol . The server sends Alice a randomly chosen number Alice digitally signs the number and sends the signature back to the server The server checks the signature using Alice's public key. If the signature is valid, then the server accepts Alice's connection request Suppose that Alice uses the same private key to log in to a server and sign her emails. Show how a server could forge emails from Alice. For this exercise, assume that the authentication mechanism signs the bare challenge without hashing, while for emails Alice signs the hash of the message. 2 marks. b. Suggest a modification to the authentication protocol which would defeat this attack. 2 marks

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Making Databases Work The Pragmatic Wisdom Of Michael Stonebraker

Authors: Michael L. Brodie

1st Edition

1947487167, 978-1947487161

More Books

Students also viewed these Databases questions

Question

What is the purpose of the post-closing trial balance?

Answered: 1 week ago

Question

Explain the nature of human resource management.

Answered: 1 week ago

Question

Write a note on Quality circles.

Answered: 1 week ago