Question
Let's assume that Bob and Alice share a secret key in a symmetric key system. To begin a communication session, Bob generates two random numbers,
Let's assume that Bob and Alice share a secret key in a symmetric key system. To begin a communication session, Bob generates two random numbers, R and S and encrypts then with the secret key, K. Bob sends the encrypted information to Alice. (Notice that all Alice knows is that she got a message that purports to be from Bob.) Alice uses the secret key (that matches Bob's) to decrypt the message and recovers R and S. Alice encrypts R using S as the encryption key and sends this ciphertext to Bob. Bob decrypts the ciphertext using S as the key and finds that the "R" he received from Alice matches the "R" he sent to her.
- Alice has authenticated herself to Bob
- Bob has authenticated himself to Alice
- Alice and Bob have authenticated each other to the other
- no authentication has been performed
- all of the above
- none of the above
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started