Question: Protblem 7 e dbie protocol Alice and Bob wish to authenticate. There is a trusted authority T which raesa fresh random session key K and
Protblem 7 e dbie protocol Alice and Bob wish to authenticate. There is a trusted authority T which raesa fresh random session key K and distributes it to Alice and Bob. Alice has vmmetrie key Ka that is shared with T. Bob shares symmetric key Kp with T ie the notation below x y m means that x sends message m to y. (mx, means that message m isencrypted withymmetric key k. Messages in quotes are literals that are transmitted. For example, the first line means Alice sends the trusted authority T a mesage saying "I want to authenticate with Bob" and that message is encrypted with key KA Alice T : {"I want to authenticate with Bob"}Ka Alice: ("Use session key" K,"and send Bob this message"("This is Alice using session Alice-Bob: (This is Alice using session key" K.)Ka Alice and Bob now share key K and can use K to secure all future messages between them Assume Alice, Bob, and T have synchronized clocks. Show how to modify the messages of the above protocol to defend against replay attacks. The only changes to the protocol permitted are to add additional values to the three messages in the protocol (but you may not delete any values or otherwise change the structure of the message flow). Make the minimum number to the protocol necessary for security, and be precise about will go. t represents a timestamp chosen by Alice. esactly where your new aded values exactly where your new added values
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
