Question: Consider the following login protocol:User knows a password PUser knows a Hash function H . ) and has a mobile calculatorUser gives login name N

Consider the following login protocol:User knows a password PUser knows a Hash function H.) and has a mobile calculatorUser gives login name N to machineMachine generates a random number RMachine gives R to userUser computes X = H(P) H(R)User gives X to machineMachine uses N to obtain P from a password tableMachine computes Y = H(P) H(R) If X = Y then machine allows loginExplain what is wrong with it and how can it be broken. [5 Marks]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!