Consider our authentication protocol in Figure 8.18 in which Alice authenticates herself to Bob, which we saw

Question:

Consider our authentication protocol in Figure 8.18 in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in hi. Now suppose that while Alice is authenticating herself to Bob, Bob must authenticate himself lo Alice. Give a scenario by which Tiudy, pretending to be Alice, can now authenticate herself to Bob as Alice. (Consider that the sequence of operations of the protocol, one with Trudy initiating and one with Bob initiating, can be arbitrarily interleaved. Pay particular attention to the fact that both Bob and Alice will use a nonce, and that if care is not taken, the same nonce can be used maliciously.)


Figure 8.18

Alice Bob I am Alice KA-e(R)

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: