Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Computer Security question, please help me figure it out. I will give thumb up. Thank you Replay Attacks On Monday, Alice uses trusted third party

Computer Security question, please help me figure it out. I will give thumb up. Thank you

Replay Attacks

On Monday, Alice uses trusted third party Cathy to establish a secure communication session with Bob. The attached file contains three slides that show three different ways to establish a shared key. Slide 1 is the simplest key exchange and shows all messages exchanged. Slide 2 and Slide 3 each show a variation of how Alice and Bob establish a shared secret key. For brevity, Slide 2 and Slide 3 focus on the key exchange and do not show the messages exchanged after Alice requests the iPhoneX. You may assume the messages exchanged after Alice requests the iPhoneX are identical regardless of whether the key exchange follows Slide1,2, or 3.

Eve observes and records all the messages exchanged. Eve also observes that a package arrived at Alice's house the next day and suspects the message exchange caused the package to be delivered. Eve knows Alice going on vacation Friday and Eve could easily pick up any package left at Alice's door. On Saturday, Eve attempts a replay attack.

Question 1A: Using the message exchange shown in Slide 1, can Eve launch a successful replay attack? If yes, draw a picture similar to Slide that shows all the messages exchanged. If no, explain why.

Question 1B: As part of the replay attack, does Eve learn Alice's credit number?

image text in transcribed

request for session key to Bob ] KA Cathy Cathy Bob Alice Alice (k) ka Alice Charge an iPhone X to my credit card 12345678 {I placed your order and it will arrive tomorrowy ks ( Thanks. This session is now complete.) ks [Acknowledged. I'm discarding key ks) ks Notation: msg) kg indicates "msg" was encrypted with key kB and have it delivered to my housej ks Bob Alice Bob Bob Bob request for session key to Bob ] KA Cathy Cathy Bob Alice Alice (k) ka Alice Charge an iPhone X to my credit card 12345678 {I placed your order and it will arrive tomorrowy ks ( Thanks. This session is now complete.) ks [Acknowledged. I'm discarding key ks) ks Notation: msg) kg indicates "msg" was encrypted with key kB and have it delivered to my housej ks Bob Alice Bob Bob Bob

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Programming The Perl DBI Database Programming With Perl

Authors: Tim Bunce, Alligator Descartes

1st Edition

1565926994, 978-1565926998

More Books

Students also viewed these Databases questions

Question

What is the purpose of the Salary Structure Table?

Answered: 1 week ago

Question

What is the scope and use of a Job Family Table?

Answered: 1 week ago