Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

By the end of this protocol: 1. AB:(A,NA) 2. BS:(B,NB,{(A,NA)}KBS) 3. SA:(NB,{(B,K,NA)}KAS,{(A,B,K, NB)}KBS) 4. AB:({(A,B,K,NB)}KBS,{NB}K) State whether B is sure of A's identity, and if

image text in transcribed

image text in transcribed

By the end of this protocol: 1. AB:(A,NA) 2. BS:(B,NB,{(A,NA)}KBS) 3. SA:(NB,{(B,K,NA)}KAS,{(A,B,K, NB)}KBS) 4. AB:({(A,B,K,NB)}KBS,{NB}K) State whether B is sure of A's identity, and if so, which single action must B perform to be sure of A's identity? 1- Yes. B receives NA 2- Yes. B sends NB 3- Yes. B sends {(A,NA)}KBS 4- Yes. B decrypts {(A,B,K,NB)}KBS 5- Yes. B receives ({(A,B,K,NB)}KBS,{NB}K) 6- Yes. B sends B's name 7- Yes. B receives A 's name 8- Yes. B encrypts (A,NA) with KBS 9- Yes. B decrypts {NB}K 10- No. None of the actions B performs proves A's identity

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Aided Database Design

Authors: Antonio Albano, Valeria De Antonellis, A. Di Leva

1st Edition

0444877355, 978-0444877352

More Books

Students also viewed these Databases questions