Attacks on Security Protocols Consider the following 4-message protocol: 1. A → S:(B, {(A, K1)}KpbS) 2. S → B:A 3. B → S:(A, {(B, K2)}KpbS) 4. S → A:(B, {K2}K1) And the following attack trace: 1. I(A) → S: (B, {(A, K)}KpbS) 2. S → B: A 3. B → S: (A, {(B, K2)}KpbS) 4. S → I(A): (B, {K2}K) Which one of these changes to the protocol messages would fix the attackthe attack then becomes impossible: a) 3. B → S:(A, {(B, {K2}KpbA)}KpbS) b) 4. S → A:(B, {K2, A}K1) c) 2. S → B:{A}KpbB d) 2. S → B:B e) 3. B → S:(A, {(B, {K2}KprS)}KpbS) f) 1. A → S:{(B, A, K1)}KpbS g) 1. A → S:(A, {(B, K1)}K pbS) h) 4. S → A:(B, {K1}K2) i) 4. S → A:(A, B, {K2}K1) j) 2. S → B:A, B Explain your answer below:
Attacks on Security Protocols Consider the following 4-message protocol: 1. A → S:(B, {(A, K1)}KpbS) 2. S → B:A 3. B → S:(A, {(B, K2)}KpbS) 4. S → A:(B, {K2}K1) And the following attack trace: 1. I(A) → S: (B, {(A, K)}KpbS) 2. S → B: A 3. B → S: (A, {(B, K2)}KpbS) 4. S → I(A): (B, {K2}K) Which one of these changes to the protocol messages would fix the attackthe attack then becomes impossible: a) 3. B → S:(A, {(B, {K2}KpbA)}KpbS) b) 4. S → A:(B, {K2, A}K1) c) 2. S → B:{A}KpbB d) 2. S → B:B e) 3. B → S:(A, {(B, {K2}KprS)}KpbS) f) 1. A → S:{(B, A, K1)}KpbS g) 1. A → S:(A, {(B, K1)}K pbS) h) 4. S → A:(B, {K1}K2) i) 4. S → A:(A, B, {K2}K1) j) 2. S → B:A, B Explain your answer below:
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
Attacks on Security Protocols
Consider the following 4-message protocol:
1. A → S:(B, {(A, K1)}KpbS)
2. S → B:A
3. B → S:(A, {(B, K2)}KpbS)
4. S → A:(B, {K2}K1)
And the following attack trace:
1. I(A) → S: (B, {(A, K)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → I(A): (B, {K2}K)
Which one of these changes to the protocol messages would fix the attackthe attack then becomes impossible:
a) 3. B → S:(A, {(B, {K2}KpbA)}KpbS)
b) 4. S → A:(B, {K2, A}K1)
c) 2. S → B:{A}KpbB
d) 2. S → B:B
e) 3. B → S:(A, {(B, {K2}KprS)}KpbS)
f) 1. A → S:{(B, A, K1)}KpbS
g) 1. A → S:(A, {(B, K1)}K pbS)
h) 4. S → A:(B, {K1}K2)
i) 4. S → A:(A, B, {K2}K1)
j) 2. S → B:A, B
Explain your answer below:
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education