Question: You have the message sequence below. Msg1. AS :{A, N1, Message1, h(A, N1, Message1)}{PKS} Msg2. SB :{A, N1,Ks, Message1, h(A, N1, Message1)}{PKB} Msg3. BA :
You have the message sequence below.
Msg1. AS :{A, N1, Message1, h(A, N1, Message1)}{PKS}
Msg2. SB :{A, N1,Ks, Message1, h(A, N1, Message1)}{PKB}
Msg3. BA : B, N1, Ks, Message2, h(B, N1, Message2)
Msg4: AB : {Data}{Ks}
Whereas:
h(m) represents the digest of the message (m).
{m}{K} represents the encryption of message (m) using the key (K)
PK is public key
N1 is a random number.
1. The protocol has a serious vulnerability, show the sequence of the message for this vulnerability and then explain the outcome of this vulnerability.
2. Redesign the above protocol to mitigate the identified vulnerability.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
