Question: Problem 2 . 3 6 ( page 9 1 ) a . The protocol is secure because AES - 1 2 8 is secure and

Problem 2.36(page 91)
a.
The protocol is secure because AES-128 is secure and r is randomly generated.
b.
The protocol is not secure because it leaks a plaintext-ciphertext pair (r,rA) if Alice and Bob do share the same AES-128 key, which may be used to launch known-plaintext attacks.
c.
The protocol is not secure because r is short.
d.
The protocol is secure because the secret key KA and KB cannot be learned from the communications by the attacker

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!