Consider our authentication protocol in Figure 8.16 in which Alice authenticates herself to Bob, which we saw

Question:

Consider our authentication protocol in Figure 8.16 in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in it). Now suppose that while Alice is authenticating herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending 10 be Alice, can now authenticate herself to Bob as Alice. (Consider that the sequence of opera lions of the protocol, one with Trudy initiating and one with Bob initiating, can be arbitrarily interleaved. Pay particular attention to the fact that both Bob and Alice will use a nonce, and that if care is not taken, the same nonce can be used maliciously.)
Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Computer Networking A Top-Down Approach

ISBN: 978-0136079675

5th edition

Authors: James F. Kurose, Keith W. Ross

Question Posted: