Question: Alice is using the public-key authentication protocol of Fig. 8-43 to authenticate communication with Bob. However, when sending message 7, Alice forgot to encrypt R

Alice is using the public-key authentication protocol of Fig. 8-43 to authenticate communication with Bob. However, when sending message 7, Alice forgot to encrypt RB. Trudy now knows the value of RB. Do Alice and Bob need to repeat the authentication procedure with new parameters in order to ensure secure communication? Explain your answer.


Figure 8-43

4. Give me EA 1. Give me EB 2. Here is ER Directory 5. Here is EA Ев (А, RA) 6 Ea (Rд, Rв, Ks) Ks (RB) Alice Bob

4. Give me EA 1. Give me EB 2. Here is ER Directory 5. Here is EA (, RA) 6 Ea (R, R, Ks) Ks (RB) Alice Bob

Step by Step Solution

3.47 Rating (157 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Even if Trudy intercepted the message including R B she ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Networking Questions!