Question: Q4) Consider the following protocol designed so that I and M will decide on fresh secret key, K_fresh. It is assumed that they have previously

Q4) Consider the following protocol designed so that I and M will decide on fresh secret key, K_fresh. It is assumed that they have previously shared an initial key, K_initial. T->M: IDE, N1, N1 is a nonce and IDt is the ID for T. M->T: E(K_initial, [N1, K_fresh ]), E implies Encryption. T->M: E(K_fresh, N1) Answer the following questions: 1. Why would T and M each believes that they share a fresh new key after the protocol runs? ( 2 Points) 2. Show how an adversary, A, can intercept a protocol run that Tinitiated using reflection to make I falsely believes that it has exchanged a new fresh key with M. (3 points)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
