Question: Question ( 1 0 0 points ) Consider the following mutual authentication protocol, where K A B is a symmetric key only known to Alice

Question (100 points)
Consider the following mutual authentication protocol, where KAB is a symmetric key only known to Alice
and Bob, R is a number chosen by Alice, and E is the encryption function of a secure symmetric cipher.
"I'm Alice", R
Alice, KAB
a) Assume Trudy has observed and recorded the three messages exchanged between Alice and Bob.
Design and explain a replay attack that Trudy can use to convince Bob that she is Alice.
b) Assume Trudy knows this protocol but is not able to record and observe the three messages exchanged between Alice and Bob. Design and explain a reflection attack that Trudy can use to convince Bob that she is Alice.
(Hint: One step is: Trudy suspends the initial connection, and opens a new connection and send some number related to R to Bob, Bob replies with some information. Such information will be useful for Trudy).
Question ( 1 0 0 points ) Consider the following

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!