Question: Authentication/Key Distribution(2+4+2+2) Consider the following protocol for Authentication/Key Distribution: (X and Y are two nodes, A is a CA/KDC, N and N2 are random numbers,

Authentication/Key Distribution(2+4+2+2) Consider the following protocol for Authentication/Key Distribution: (X and Y are two nodes, A is a CA/KDC, N and N2 are random numbers, and Ex means encrypted with the secret key of X.) 2. A-X: Ex(Ni, X,Y, K, Ey (K, X)) 4, YX: Ex(Na) 1. What is purpose of Ni in message 2? 2. Show that if an attacker were to break an old K, he/she can impersonate user X to user Y 3. How to solve this problem? 4. What is the purpose of Steps 4 and 5
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
