Two attack scenarios can happen here
Here Trudy gets the secret messages from Alice and may edit it. Also Bob sends the message to Trudy thinking its Alice. Trudy thus cheats the communication being a middle man
2.Trudy can act in between due to lack of security. So silently trudy sees all messages. Including the password shared by Alice.
3. The next attack scenarion includes that Alice always sends message from an IP address and Bob verifies that IP for authentication. So its easy for an intruder to come in between using that IP address. Its actually IP spoofing.
Authentication Protocol: 3 Marks] Q4 (Authentication Protocol) The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptograph...
Briefly explain each attack scenario performed by Trudy with a proper diagram which on the protocol. Q4 (Authentication Protocol) [3 Marks] The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptography algorithm that is used here is secure. Given that the following protocol does not provide mutual authentication. Give two different attack scenarios where Trudy can convince Bob that she is Alice. Briefly explain each attack scenario performed by Trudy with proper...
your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.] 5 Marks] Q5 (OpenSSL and IPFS) Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KaB) using OpenSSL,...