Question: Protblem 7 e dbie protocol Alice and Bob wish to authenticate. There is a trusted authority T which raesa fresh random session key K and

 Protblem 7 e dbie protocol Alice and Bob wish to authenticate.

Protblem 7 e dbie protocol Alice and Bob wish to authenticate. There is a trusted authority T which raesa fresh random session key K and distributes it to Alice and Bob. Alice has vmmetrie key Ka that is shared with T. Bob shares symmetric key Kp with T ie the notation below x y m means that x sends message m to y. (mx, means that message m isencrypted withymmetric key k. Messages in quotes are literals that are transmitted. For example, the first line means Alice sends the trusted authority T a mesage saying "I want to authenticate with Bob" and that message is encrypted with key KA Alice T : {"I want to authenticate with Bob"}Ka Alice: ("Use session key" K,"and send Bob this message"("This is Alice using session Alice-Bob: (This is Alice using session key" K.)Ka Alice and Bob now share key K and can use K to secure all future messages between them Assume Alice, Bob, and T have synchronized clocks. Show how to modify the messages of the above protocol to defend against replay attacks. The only changes to the protocol permitted are to add additional values to the three messages in the protocol (but you may not delete any values or otherwise change the structure of the message flow). Make the minimum number to the protocol necessary for security, and be precise about will go. t represents a timestamp chosen by Alice. esactly where your new aded values exactly where your new added values

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!