Question: Computer Security - Replay Attacks -multiple choice question Replay Attacks On Monday, Alice uses trusted third party Cathy to establish a secure communication session with

Computer Security - Replay Attacks -multiple choice question

Replay Attacks

On Monday, Alice uses trusted third party Cathy to establish a secure communication session with Bob. The picture below shows the messages used to establish a shared key and the start of a conversation between Alice and Bob. You may assume both Alice and Bob discard Ks at the end of the conversation.

Computer Security - Replay Attacks -multiple choice question Replay Attacks On Monday,

Eve observes and records all the messages exchanged. Eve also observes that a package arrived at Alice's house the next day and suspects the message exchange caused the package to be delivered. Eve knows Alice going on vacation Friday and Eve could easily pick up any package left at Alice's door.

Eve uses a cryptanalytic attack and is able to learn Ks. On Saturday, Eve attempts a replay attack.

Given the message exchange above, can Eve launch a successful replay attack?

Choose the correct multiple choice, with explanations.

Alice uses trusted third party Cathy to establish a secure communication session

Alice || Bob || r Cathy Cathy Bob 1 Alic 2 Alice 3 Alic 4 AliceBob Charge an iPhone X to my credit card 12345678 and have it delivered to my house] ks Bob 6 Alice o Yes, Eve can replay the message 3, can produce a new message 5, and then can ask a new iPhone and iPad be delivered to Eve's house o Yes, Eve can replay the message 3, can produce a new message 5, and but then the only messages Bob will believe is a request to buy an iPhone X that will be delivered to Alice's house Yes, Eve can replay the message 1. No, Bob has chosen a new random number r2 so Eve cannot computer r2-1

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!