Question: The table below shows the authentication protocol, wherein pwd is Albert's password and K is a key derived from pwd. Can an attacker that can

The table below shows the authentication protocol, wherein pwd is Albert's password and K is a key derived from pwd. Can an attacker that can eavesdrop messages (but not intercept or spoof messages) obtain pwd by off-line password guessing? If you answer no, explain briefly. If you answer yes, describe the attack.

Albert (has pwd)

Bob (has K)

send [conn] to Bob

generate random challenge Ram

send [Ram]

compute K from pwd

compute A encrypt(Ram) with key K

send [A] to Bob

compute B decrypt(A) with key K

if B = Ram then Albert is authenticated

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!