Question: The chart below shows an authentication protocol, followed by data exchange, followedby disconnection. Only an initial part of the authentication protocol is shown; here, pw
The chart below shows an authentication protocol, followed by data exchange, followedby disconnection. Only an initial part of the authentication protocol is shown; here,
pw is As password, J is a key derived from pw and L is a highquality key. Assume
an attacker that can eavesdrop messages and intercept and spoof messages sent
by A but not those sent by B Complete the authentication protocol ie Supply
the part indicated by the so that in spite of this attacker
B authenticates A
this authentication is not vulnerable to offline password guessing, and
A and B establish a session key S for encrypting data such that after A and
B disconnect and forget even if the attacker learns pw the attacker cannot
decrypt the data exchanged.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
