Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

There is a login protocol between a user (ATM card) and a server (ATM machine), which works as follows: The user U has a password

image text in transcribed

image text in transcribed

image text in transcribed

There is a login protocol between a user (ATM card) and a server (ATM machine), which works as follows: The user U has a password P and knows a hash function H. He also has a calculator. User sends his login name N to server S Server generates a random number R and sends it to U. User calculates: X=Hash(P) XOR Hash(R) User sends the value X to server By using a table for the N value, the server reads the P value for his user. Server calculates Y=Hash(P) XOR Hash(R) If X=Y, the server grants the loging for his user. . Question 3. a. Do you see any problem in this protocol? If there is a problem, how would you break the system? That is, is it possible for some other user to masquarade U and login in to the system? If your answer is yes, show step by step how this attack works. Once again, if you said YES to a possible attack, how could you correct the protocol. Show the new protocol steps

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Making Databases Work The Pragmatic Wisdom Of Michael Stonebraker

Authors: Michael L. Brodie

1st Edition

1947487167, 978-1947487161

More Books

Students also viewed these Databases questions

Question

What is the primary purpose of a stock split?

Answered: 1 week ago

Question

=+ Of the HR issues mentioned in the case,

Answered: 1 week ago