The chart below shows an authentication protocol, followed by data exchange, followed by disconnection. Only an initial
Question:
The chart below shows an authentication protocol, followed by data exchange, followed by disconnection. Only an initial part of the authentication protocol is shown; here, pw is As password, J is a key derived from pw ?and L is a highquality key. Assume an attacker that can ?eavesdrop messages and ?intercept and spoof messages sent by A but not those sent by B ?Complete the authentication protocol ie ?Supply the part indicated by the ?so that in spite of this attacker
?B authenticates A
?this authentication is not vulnerable to offline password guessing, and
?A and B establish a session key S for encrypting data ?such that after A and B disconnect and forget S ?even if the attacker learns pw ?the attacker cannot decrypt the data exchanged.tableA has pwB has J ?Lsend ?conn ?to BtableX encryptL ?withkey Jsend ?X tablecompute J from pwJ ?larr decryptX ?with keytableA and B exchangedata
Operations Management Processes And Supply Chains
ISBN: 9781292409863
13th Global Edition
Authors: Lee Krajewski, Naresh Malhotra, Larry Ritzman