Question: There is a login protocol between a user (ATM card) and a server (ATM machine), which works as follows: The user U has a password

 There is a login protocol between a user (ATM card) and

a server (ATM machine), which works as follows: The user U has

There is a login protocol between a user (ATM card) and a server (ATM machine), which works as follows: The user U has a password P and knows a hash function H. He also has a calculator. User sends his login name N to server S Server generates a random number R and sends it to U. User calculates: X=Hash(P) XOR Hash(R) User sends the value X to server By using a table for the N value, the server reads the P value for his user. Server calculates Y=Hash(P) XOR Hash(R) If X=Y, the server grants the loging for his user. . Question 3. a. Do you see any problem in this protocol? If there is a problem, how would you break the system? That is, is it possible for some other user to masquarade U and login in to the system? If your answer is yes, show step by step how this attack works

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!