Question: Consider the following login protocol. user knows password P user knows Hash function H(.) and has a mobile calculator user gives login name N to

Consider the following login protocol.

user knows password P

user knows Hash function H(.) and has a mobile calculator

user gives login name N to machine

machine generates random number R

machine gives R to user

user computes X := Hash(P) XOR Hash(R)

user gives X to machine

machine uses N to obtain P from password table

machine computes Y := Hash(P) XOR Hash(R)

if X=Y then machine allows login

a. Explain what is wrong with it and how can it be broken.

b. Show a simple way to strengthen this protocol against your attack.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!