Question: . Mutual Authentication using Symmetric Key [ 1 6 Points ] ( a ) Consider the following mutual authentication protocol, where KAB is a shared
Mutual Authentication using Symmetric Key Points
a Consider the following mutual authentication protocol, where KAB is a shared
symmetric key.
Give two different attacks that Trudy can use to convince Bob that she is Alice.
b Consider the following protocol, where KAB is a shared symmetric key, CLNT and
SRVR are constants, and K hSRARB is the session key.
i Does Alice authenticate Bob? Justify your answer.
ii Does Bob authenticate Alice? Justify your answer. Mutual Authentication using Symmetric Key Points
a Consider the following mutual authentication protocol, where is a shared
symmetric key.
Give two different attacks that Trudy can use to convince Bob that she is Alice.
b Consider the following protocol, where KAB is a shared symmetric key, CLNT and
SRVR are constants, and is the session key.
i Does Alice authenticate Bob? Justify your answer.
ii Does Bob authenticate Alice? Justify your answer.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
