Question: The protocol referred to in Problem 15.1 can be reduced from seven steps to five, having the following sequence: 1. A B: 2. A
The protocol referred to in Problem 15.1 can be reduced from seven steps to five, having the following sequence:
1. A → B:
2. A → KDC:
3. KDC → B:
4. B → A:
5. A → B:
Show the message transmitted at each step.
Problem 15.1
We outlined the public-key scheme proposed in [WOO92a] for the distribution of secret keys. The revised version includes IDA in steps 5 and 6.What attack, specifically, is countered by this revision?
Step by Step Solution
3.42 Rating (155 Votes )
There are 3 Steps involved in it
1 A B 2 B KDC 3 KDC B 4 BA 5 ... View full answer
Get step-by-step solutions from verified subject matter experts
