Question: Consider the following login protocol. user knows password P user knows Hash function H(.) and has a mobile calculator user gives login name N to
Consider the following login protocol.
user knows password P
user knows Hash function H(.) and has a mobile calculator
user gives login name N to machine
machine generates random number R
machine gives R to user
user computes X := Hash(P) XOR Hash(R)
user gives X to machine
machine uses N to obtain P from password table
machine computes Y := Hash(P) XOR Hash(R)
if X=Y then machine allows login
a. Explain what is wrong with it and how can it be broken.
b. Show a simple way to strengthen this protocol against your attack.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
