Question: Encryption mode looks like the diagram below:where } _ ( K 1 ) : } indicates public key encryption using Key K 1

Encryption mode looks like the diagram below:where }_(K1):} indicates public key encryption using Key "K1" and E(Msg1, K2) indicates symmetric key encryption of "Msg1" sing key "K2" and h(Msg2) indicates "hash" of "Msg2".Note that R_A and R_B are used interchangeably with R_(A) and R_(B) respectively in the multiple choices below.
Q: It is possible for Trudy to create a fake conversation between Alice and Bob exactly as shown above without either Alice or Bob being involved because:
a. trudy can choose exponents a and b and nonces RA and RB
b. trudy can compute g^ab mod p just as Alice and Bob would
C. trudy can encrypt messages using public keys of Alice and Bob would
d. Trudy can do all of the above
Encryption mode looks like the diagram

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!