Question: Security Protocols Consider the following authentication protocol A B : A B A : B , N B A B : E ( K ,

Security Protocols
Consider the following authentication protocol
AB:A
BA:B,NB
AB:E(K,|A,B,NB|)
where K is a key shared between A and B,NB is a nonce generated by B and E(K,M)=
Ko+M.(We thus assume that the length of the key K is equal to length of the bitstring
obtained by concatenating the bitstrings representing A,B, and NB.)
(a) The protocol is used by B to authenticate A. Does the protocol achieve this goal?
Please justify your answer.
(b) Now consider the protocol consisting of the following single step:
1.AB:E(K,|A,B,TA|)
where K is a key shared between A und B,TA is a timestamp generated by A, and
E(K,M)=Ko+M.(As above, we thus assume that the length of the hey K is cqual
to length of the bitstring obtained by concatenating the bilstrings representing A,B, and
TA.) Upon reception of the message I1 must clieck that TA-Th> whem T1 is the
current value of its own clock and o is a threshold that depends on the latenoy of the
communication link, Similarly to the protocol in the prevlous question, this protowt is
ured by B to authenticats A, Does the protocol achleve thits goal?
Please justify your answer.
 Security Protocols Consider the following authentication protocol AB:A BA:B,NB AB:E(K,|A,B,NB|) where

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!