Question: Consider the following login protocol:User knows a password PUser knows a Hash function H . ) and has a mobile calculatorUser gives login name N
Consider the following login protocol:User knows a password PUser knows a Hash function H and has a mobile calculatorUser gives login name N to machineMachine generates a random number RMachine gives R to userUser computes X HP HRUser gives X to machineMachine uses N to obtain P from a password tableMachine computes Y HP HR If X Y then machine allows loginExplain what is wrong with it and how can it be broken. Marks
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
