Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Security Protocols Consider the following authentication protocol A B : A B A : B , N B A B : E ( K ,

Security Protocols
Consider the following authentication protocol
AB:A
BA:B,NB
AB:E(K,|A,B,NB|)
where K is a key shared between A and B,NB is a nonce generated by B and E(K,M)=
Ko+M.(We thus assume that the length of the key K is equal to length of the bitstring
obtained by concatenating the bitstrings representing A,B, and NB.)
(a) The protocol is used by B to authenticate A. Does the protocol achieve this goal?
Please justify your answer.
(b) Now consider the protocol consisting of the following single step:
1.AB:E(K,|A,B,TA|)
where K is a key shared between A und B,TA is a timestamp generated by A, and
E(K,M)=Ko+M.(As above, we thus assume that the length of the hey K is cqual
to length of the bitstring obtained by concatenating the bilstrings representing A,B, and
TA.) Upon reception of the message I1 must clieck that TA-Th> whem T1 is the
current value of its own clock and o is a threshold that depends on the latenoy of the
communication link, Similarly to the protocol in the prevlous question, this protowt is
ured by B to authenticats A, Does the protocol achleve thits goal?
Please justify your answer.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Current Trends In Database Technology Edbt 2006 Edbt 2006 Workshops Phd Datax Iidb Iiha Icsnw Qlqp Pim Parma And Reactivity On The Web Munich Germany March 2006 Revised Selected Papers Lncs 4254

Authors: Torsten Grust ,Hagen Hopfner ,Arantza Illarramendi ,Stefan Jablonski ,Marco Mesiti ,Sascha Muller ,Paula-Lavinia Patranjan ,Kai-Uwe Sattler ,Myra Spiliopoulou ,Jef Wijsen

2006th Edition

3540467882, 978-3540467885

More Books

Students also viewed these Databases questions

Question

Show that, in SQL, all is identical to not in.

Answered: 1 week ago