Alice is using the public-key authentication protocol of Fig. 8-43 to authenticate communication with Bob. However, when

Question:

Alice is using the public-key authentication protocol of Fig. 8-43 to authenticate communication with Bob. However, when sending message 7, Alice forgot to encrypt RB. Trudy now knows the value of RB. Do Alice and Bob need to repeat the authentication procedure with new parameters in order to ensure secure communication? Explain your answer.


Figure 8-43

4. Give me EA 1. Give me EB 2. Here is ER Directory 5. Here is EA Ев (А, RA) 6 Ea (Rд, Rв, Ks) Ks (RB) Alice Bob

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Computer Networks

ISBN: 978-0132126953

5th edition

Authors: Andrew S. Tanenbaum, David J. Wetherall

Question Posted: