Question

Authentication Protocol:

3 Marks] Q4 (Authentication Protocol) The following mutual authentication protocol is proposed based on a symmetric-key crypt

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Two attack scenarios can happen here

  1. Trudy acts as a middle man in between and Alice and Bob does not know that. Man in the middle attack.

Here Trudy gets the secret messages from Alice and may edit it. Also Bob sends the message to Trudy thinking its Alice. Trudy thus cheats the communication being a middle man

Bob Alice am Alice Trudy

2.Trudy can act in between due to lack of security. So silently trudy sees all messages. Including the password shared by Alice.

l am Alice, passwor OK l am Alice password OK

3. The next attack scenarion includes that Alice always sends message from an IP address and Bob verifies that IP for authentication. So its easy for an intruder to come in between using that IP address. Its actually IP spoofing.

Bob Alice I am Alice, Alices IP addr Trudy

Add a comment
Know the answer?
Add Answer to:
Authentication Protocol: 3 Marks] Q4 (Authentication Protocol) The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptograph...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Briefly explain each attack scenario performed by Trudy with a proper diagram which on the protocol. Q4 (Authentication...

    Briefly explain each attack scenario performed by Trudy with a proper diagram which on the protocol. Q4 (Authentication Protocol) [3 Marks] The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptography algorithm that is used here is secure. Given that the following protocol does not provide mutual authentication. Give two different attack scenarios where Trudy can convince Bob that she is Alice. Briefly explain each attack scenario performed by Trudy with proper...

  • your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and...

    your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.] 5 Marks] Q5 (OpenSSL and IPFS) Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KaB) using OpenSSL,...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT