Question: Replay Attack Problem: Please provide an explanation of the answer, please! Replay Attacks On Monday, Alice uses trusted third party Cathy to establish a secure
Replay Attack Problem:
Please provide an explanation of the answer, please!


Replay Attacks On Monday, Alice uses trusted third party Cathy to establish a secure communication session with Bob. The picture below shows the messages used to establish a shared key and the start of a conversation between Alice and Bob. You may assume both Alice and Bob discard Ks at the end of the conversation Alice 1 Alice 2 Alic 3 Alice Bob Bob Cathy Alice ll r3 Alice || Bob || r1 ll (Alice | r3y kB 4 AliceCathy Bob 5 Alic AliceBob 2 { Charge an iPhone X to my credit card 12345678 and have it delivered to my housej ks Eve observes and records all the messages exchanged. Eve also observes that a package arrived at Alice's house the next day and suspects the message exchange caused the package to be delivered. Eve knows Alice going on vacation Friday and Eve could easily pick up any package left at Alice's door. Eve uses a cryptanalytic attack and is able to learn Ks. On Saturday, Eve attempts a replay attack.On Saturday, Eve attempts a replay attack. Given the message exchange above, can Eve launch a successful replay attack? O No, Eve cannot launch a replay attack. O Yes, Eve can replay the messages starting from message 5. O Yes, Eve can replay the messages starting from message 1 O Yes, Eve can replay the messages starting from message 3
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
