Question: Computer Security - Replay Attacks -multiple choice question Replay Attacks Choose the correct multiple choice, with explanations. Question 11 2 pts Replay Attacks On Monday,

Computer Security - Replay Attacks -multiple choice question

Replay Attacks

Computer Security - Replay Attacks -multiple choice question Replay Attacks Choose the

Choose the correct multiple choice, with explanations.

Question 11 2 pts Replay Attacks On Monday, Alice uses trusted third party Cathy to establish a secure communication session with Bob The picture below shows the messages used to establish a shared key and show the complete conversation between Alice and Bob request for session key to Bob KA 1 Alice 2 Alice 3 Alice Cathy Cathy Bob (k,I ks Charge an iPhone X to my credit card 12345678 4 Alice and have it delivered to my house) ks Bob (I placed your order and it will arrive tomorrow ks { Thanks. This session is now complete.) ks Acknowledged. I'm discarding key s ks Notation: msg) kg indicates "msg" was encrypted with key kB 5 Alice Bob 6 Alic 7 Alice Bob Eve observes and records all the messages exchanged. Eve also observes that a package arrived at Alice's house the next day and suspects the message exchange caused the package to be delivered. Eve knows Alice going on vacation Friday and Eve could easily pick up any package left at Alice's door. On Saturday, Eve attempts a replay attack. Given the message exchange above, can Eve launch a successful replay attack? o Yes, Eve can replay the messages starting from message 3 O No, Eve cannot launch a replay attack. o Yes, Eve can replay the messages starting from message 1. o Yes, Eve can replay the messages starting from message 4

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!