Question

(c) Consider the following scheme to provide message authentication. B gets a message supposedly from A, and B wants to make sure that the message was sent by A and not modified by BG along the way. A generates a secret key K for DES, calculates C EK(M), and sends M,C,K to B. B checks if M DK(C) and if it is, accepts that M was sent by A. Is this a good scheme? i. Give a YES/NO answer. No ii. If you said No explain what you think is the single biggest weaknesdof the scheme.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Since the answer is No, so the biggest weakness of this scheme is:

1)The biggest obstacle in deploying a public-key algorithm is the necessity for a proper exchange of private keys. This transaction must be completed in a secure manner. In the past, this would often have to be done through some type of face-to-face meeting, which proves quite impractical in many circumstances when taking distance and time into account. If one assumes that security is a risk to begin with due to the desire for a secret exchange of data in the first place, the exchange of keys becomes further complicated.

2)Another problem concerns the compromise of a private key. In symmetric-key cryptography, every participant has an identical private key. As the number of participants in a transaction increases, both the risk of compromise and the consequences of such a compromise increase dramatically. Each additional user adds another potential point of weakness that an attacker could take advantage of.

Add a comment
Know the answer?
Add Answer to:
Consider the following scheme to provide message authentication. B gets a message supposedly from A, and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and...

    your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.] 5 Marks] Q5 (OpenSSL and IPFS) Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KaB) using OpenSSL,...

  • 5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice...

    5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice and Bob have p= 17,9 = 19. Alice has e=31 and Bob has e=29. a. What is the public key pair used in the transmission? 2 marks b. What is the secret key pair used in the transmission? 4 marks c. Encrypt the message m=111. 4 marks d. Decrypt the resulting ciphertext. 4 marks e. What's the security problem between Alice and Bob? How...

  • In this question, we will use the following notations: PU and PR are the Public and...

    In this question, we will use the following notations: PU and PR are the Public and its corresponding Private keys K is a symmetric Key. 1. [M]K message M is decrypted with K MjPu: message M is encrypted/verified with P is the correspondin is a Message an Cipher M h: message M is encrypted with K. H(M): the hash of message M. Assume that Bob and Alice agree on a shared secret K. Bob wants to authenticate himself to Alice...

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT