Question: Consider the following protocol: A - > KDC :IDA | | IDB | | N 1 KDC - > A :E ( ka , [
Consider the following protocol:
A KDC :IDAIDBN
KDC A :EkaksIDBNEkbksIDA
A B :EkbksIDA B A :EksN
A B :EksfN
a Explain the protocol. points
b Can you think of a possible attack on this protocol? Explain how it can be done. points
c How can we prevent this attack? just write the basics of the idea. points
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
