Question: A server uses a Challenge-Response protocol to authenticate users. The server stores the legitimate users' public key. Each time when a user wants to login,
A server uses a Challenge-Response protocol to authenticate users. The server stores the legitimate users' public key. Each time when a user wants to login, the server generates a random challenge and sends it to the user. The user then generates a digital signature on his/her workstation and sendsthe digital signature to the server. The server authenticates the user by verifying his/her signature on the random message. Describe an attack against the server.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
