Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Computer Security - Replay Attacks -multiple choice question Replay Attacks Choose the correct multiple choice, with explanations. Question 12 2 pts Replay Attacks On Monday,

Computer Security - Replay Attacks -multiple choice question

Replay Attacks

image text in transcribed

Choose the correct multiple choice, with explanations.

Question 12 2 pts Replay Attacks On Monday, Alice uses trusted third party Cathy to establish a secure communication session with Bob The picture below shows the messages used to establish a shared key and show the complete conversation between Alice and Bob request for session key to Bob ) kA 1 Alice 2 Alice 3 Alice Cathy Cathy Bob Charge an iPhone X to my credit card 12345678 { I placed your order and it will arrive tomorrow/ks { Thanks. This session is now complete.) ks 4 Alice and have it delivered to my house! ks Bob 5 Alice Bob 6 Alice 7 Alice, {Acknowledged. I'm discarding key ks ks Notation: msg) kg indicates "msg" was encrypted with key kB Bob Bob Eve observes and records all the messages exchanged. Eve also observes that a package arrived at Alice's house the next day and suspects the message exchange caused the package to be delivered. Eve knows Alice going on vacation Friday and Eve could easily pick up any package left at Alice's door. On Saturday, Eve attempts a replay attack. Given the message exchange above, what could Eve accomplish with a replay attack? o Eve can order an iPhone X, charge it to Alice's credit card, and have it delivered to Alice's house o Eve cannot launch a replay attack in this case o Eve can use the replay attack to learn Alice's credit card number. o Eve can order an iPhoneX, charge it to Alice's credit card, and have it delivered to Eve's house

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions