Question: Security Protocols Consider the following authentication protocol 1 . A B : E ( K , [ A , B , T ] ) where
Security Protocols Consider the following authentication protocol
:
where is a key shared between A and and is a timestamp generated by
a Indicate which of the following security properties are met by the protocol. For the properties that are
met by the protocol describe the assumptions that must hold for the property to hold. For the properties
that are not met by the protocol write an execution trace witnessing the violation of the property.
A A authenticates
B authenticates
C Secrecy of
D Secrecy of
b Describe the actions carried out by upon receipt of the message for a proper functioning of the
protocol.
c What are the consequences of using an implementation of the protocol where the timestamp is very
coarse, eg successive time instants correspond to large intervals say several seconds
d Assume that successive time instants correspond to second and that timestamps are represented by
bits. How long must an attacker wait to mount a replay attack?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
