Consider the following challenge-response mutual authentication protocol between Alice, a client, and Bob, a stateless server...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider the following challenge-response mutual authentication protocol between Alice, a client, and Bob, a stateless server that does not remember values from a previous round of authentication exchange. R is a random number used by Bob which has the property that the probability of its being repeated is O. KAB is a secret key that is known only to Alice and Bob and will never be known by anybody else. Choose the correct answer from the following. 5 points Alice Hello, I am Alice. Is that you, Bob? Yes, I am. Random # R. KAB(R-1) Done, we have authenticated each other Bob (a) This is a correct mutual authentication protocol. This is because, only the real Alice will be able to successfully generate the response KAB (R-1) to Bob's challenge value R. and the real Bob will be able to decrypt that response value. (b) This a correct authentication protocol in the sense that it successfully authenticates Alice to Bob, though it does not authenticate Bob to Alice. This is because only the real Alice will be able to generate the response KAB{R-1} to Bob's challenge. (c) This is a completely incorrect authentication protocol. This is because, anybody can replay the response message KAB {R-1) claiming that it originated from Alice. Since Bob is a stateless server, it will not remember the value R. that was sent and hence will not able to detect a replay of KAB{R-1}. Consider the following challenge-response mutual authentication protocol between Alice, a client, and Bob, a stateless server that does not remember values from a previous round of authentication exchange. R is a random number used by Bob which has the property that the probability of its being repeated is O. KAB is a secret key that is known only to Alice and Bob and will never be known by anybody else. Choose the correct answer from the following. 5 points Alice Hello, I am Alice. Is that you, Bob? Yes, I am. Random # R. KAB(R-1) Done, we have authenticated each other Bob (a) This is a correct mutual authentication protocol. This is because, only the real Alice will be able to successfully generate the response KAB (R-1) to Bob's challenge value R. and the real Bob will be able to decrypt that response value. (b) This a correct authentication protocol in the sense that it successfully authenticates Alice to Bob, though it does not authenticate Bob to Alice. This is because only the real Alice will be able to generate the response KAB{R-1} to Bob's challenge. (c) This is a completely incorrect authentication protocol. This is because, anybody can replay the response message KAB {R-1) claiming that it originated from Alice. Since Bob is a stateless server, it will not remember the value R. that was sent and hence will not able to detect a replay of KAB{R-1}.
Expert Answer:
Answer rating: 100% (QA)
The answer is c This is a completely incorrect authentication protocol Heres why Bob does not authenticate Alice Anyone can send the message KABR1 to ... View the full answer
Related Book For
Computer Networking A Top-Down Approach
ISBN: 978-0136079675
5th edition
Authors: James F. Kurose, Keith W. Ross
Posted Date:
Students also viewed these programming questions
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
What does this code print (unless it produces an error)? = plane "A passengers" plane [2] = "m" print (plane)
-
Lantaigne Inc. entered into a seven-year lease of equipment from Weingartner Inc. At the lease's inception, it is estimated that the equipment has an economic life of 10 years and fair value of...
-
Use Thevenin?s theorem to find V o in the circuit in figure. 12 0 -j4 n= 12/0 vt (1)/90 A 203 Vo
-
The account balances taken from the trial balance and adjusted trial balance columns of the worksheet of Trans Transcription Service for the year ended 30 June 2026, the first year of operations, are...
-
What rewards are easiest for managers to control? What rewards are more difficult to control?
-
Required information The following Information applies to the questions displayed below] Simon Company's year-end balance sheets follow At December 31 points Assets eflook 10 Cash Accounts...
-
Photo Tonight, a film-developing and camera-repair franchise, began business on January 1, 20X1. In the process of beginning operations, it incurred the following capital expenditures: Developing...
-
1.4. The world's 10 largest companies yield the following data: The World's 10 Largest Companies x2 x = profits (billions) Company Citigroup General Electric American Intl Group Bank of America HSBC...
-
Accountant 14 is a tax senior. LMN is a new client for us. He just found an error in the lastyear's tax return and LMN owes IRS a lot of money. He believes he should amend the returnbut LMN refuses....
-
Part C- Complete budget variance and prepare financial report It is now January 202X and second quarter of the financial year is over (October to December). The accountant prepared the following...
-
Consider the following information about a mobile car wash business Joel opened last year: Price = $20 per unit Quantity sold = 39,196 Implicit cost = $61,977 Average material cost = $9 per unit...
-
Consider the following information about a roofing business Taylor opened last year: Taylor was a manager at Stater Bros, with an annual salary (including benefits) of $50,000 per year. Taylor has...
-
Identify a company/brand that has had negative PR within the las year 2022 . Discuss the issue and what the company has done or is doing to be seen in a more positive light.
-
The 2000 m road paving project consists of the following activities:(in order Important notes: The contract was made as follows: The first activity A is carried out by one working group from the...
-
Players A, B, and C toss a fair coin in order. The first to throw a head wins. What are their respective chances of winning?
-
Suppose users share a 2 Mbps link. Also suppose each user transmits continuously at I Mbps when transmitting, but each user transmits only 20 percent of the time. (See the discussion of statistical...
-
Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
-
Describe polling and token-passing protocols using the analogy of cocktail party interactions.
-
What is the function of a memory cell?
-
How many oxygen molecules can one molecule of hemoglobin carry?
-
How does a low-Calorie diet help you lose weight?
Study smarter with the SolutionInn App