Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

By the end of this protocol: 1. AB:(A,NA) 2. BS:(B,NG:{(A,NA)}KeS) 3. SA:(NB{((B,K1NA)}KAS,{(A,B,K1NB)}KBS) 4. AB:({(A,B,K,NB)}KBS,{NB)K) State whether A is sure of B's identity, and if so,

image text in transcribed

By the end of this protocol: 1. AB:(A,NA) 2. BS:(B,NG:{(A,NA)}KeS) 3. SA:(NB{((B,K1NA)}KAS,{(A,B,K1NB)}KBS) 4. AB:({(A,B,K,NB)}KBS,{NB)K) State whether A is sure of B's identity, and if so, which single action must A perform to be sure of B's identity? 1- Yes. A receives {(A,B,K,NB)}KBS 2- Yes. A sends A 3- Yes. A sends {NB}K 4- Yes. A encrypts (A, B, K, NB ) 5- Yes. A receives NB 6- Yes. A decrypts {(B,K,NA)}KAS 7. Yes. A sends NA 8- Yes. A sends {(A,B,K,NB)}KBS 9. Yes. A encrypts NB 10- No. None of the actions A performs proves B's identity

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intranet And Web Databases For Dummies

Authors: Paul Litwin

1st Edition

0764502212, 9780764502217

More Books

Students also viewed these Databases questions