Question: Recall that in the challenge - response setting, the client and the server share a secret key. If somehow the key is stolen from the
Recall that in the challengeresponse setting, the client and the server share a secret key. If somehow the key is stolen from the server then all is lost. Its desirable that the client and server have different keys Kc and Ks and the server key
Ks is public.
Consider the following protocol.
Let K E D be a publickey encryption scheme. Run pk sk$ K The server key Ks is pk and the client key Kc is sk
If the client wants to identify himself, the server picks a random nonce r $
n and sends C $ EKs r to the client.
On receiving C the client then computes r DKc C and sends r to the server.
The server accepts only if r r
This scheme is an attractive option for logging into a remote website from a laptop using a mobile phone as a second factor. The website displays C as a QR code on the laptop screen and the user scans the code using the phones camera. The phone decrypts C and displays the six least significant digits of r on the screen. The user then manually types the six digits into her web browser, and this
value is sent to the remote web site to be verified.
a For the scheme above to be secure the encryption scheme needs to be CCAsecure Explain informally why this is the case.
b Find a publickey encryption scheme that is CPAsecure but if we use it for the protocol above, a maninthemiddle adversary can impersonate the client.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
