# Question

In the protocol of Fig. 8-39, why is A sent in plaintext along with the encrypted session key?

In the protocol of Fig. 8-39, we pointed out that starting each plaintext message with 32 zero bits is a security risk. Suppose that each message begins with a per-user random number, effectively a second secret key known only to its user and the KDC. Does this eliminate the known plaintext attack? Why?

In the protocol of Fig. 8-39, we pointed out that starting each plaintext message with 32 zero bits is a security risk. Suppose that each message begins with a per-user random number, effectively a second secret key known only to its user and the KDC. Does this eliminate the known plaintext attack? Why?

## Answer to relevant Questions

In the Needham-Schroeder protocol, Alice generates two challenges, RA and RA2. This seems like overkill. Would one not have done the job?Assuming that everyone on the Internet used PGP, could a PGP message be sent to an arbitrary Internet address and be decoded correctly by all concerned? Discuss your answer.What is the difference between the classical and the statistical approaches to thermodynamics?At 45° latitude, the gravitational acceleration as a function of elevation z above sea level is given by g = a - bz, where a = 9.807 m/s2 and b = 3.32 x 10-6 s-2. Determine the height above sea level where the weight of an ...For a system to be in thermodynamic equilibrium, do the temperature and the pressure have to be the same everywhere?Post your question

0