Question: The chart below shows an authentication protocol, followed by data exchange, followed by disconnection. Only an initial part of the authentication protocol is shown; here,
The chart below shows an authentication protocol, followed by data exchange, followed by disconnection. Only an initial part of the authentication protocol is shown; here, pw is As password, J is a key derived from pw ?and L is a highquality key. Assume an attacker that can ?eavesdrop messages and ?intercept and spoof messages sent by A but not those sent by B ?Complete the authentication protocol ie ?Supply the part indicated by the ?so that in spite of this attacker
?B authenticates A
?this authentication is not vulnerable to offline password guessing, and
?A and B establish a session key S for encrypting data ?such that after A and B disconnect and forget S ?even if the attacker learns pw ?the attacker cannot decrypt the data exchanged.tableA has pwB has J ?Lsend ?conn ?to BtableX encryptL ?withkey Jsend ?X tablecompute J from pwJ ?larr decryptX ?with keytableA and B exchangedata
******* * A (has pw) send [ conn] to B compute J from pw L' decrypt(X) with key J -A and B exchange data A and B disconnect B (has J, L) X encrypt(L) with key J send [X]
Step by Step Solution
3.39 Rating (158 Votes )
There are 3 Steps involved in it
To complete the authentication protocol and ensure security against the described attacker we can proceed as follows A sends a connection request to B ... View full answer
Get step-by-step solutions from verified subject matter experts
