Consider the following variants of the Needham-Schroeder Public-Key Protocol and identify the ones that are executable AND do not suffer from the man-in-the-middle attack. a. A → B: {N1, N2, A}x, B → A : {N1,N2, N3, B}x, A → B : {N1,N2}x, b. A- B: {N1, A}x, B → A : {N1,N2, B}x, A → B : {N1,N2}x, c. A- B: {N1,A}x, B → A : {N1, A, N2, N3, B}x, A → B : {N2,N3}K, d. A+ B: {N1, A}x, B → A : {N2,N1, B}x. A → B : {N2}x, e. A→ B : {NI, A}x, B → A : {N1,N2, B)x, O f. A→ B: {N1, B}x, B→ A : {N1, B,N2}x, A → B : {N2}x,

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
Recall that a protocol specification is said to be non-executable when the principals cannot construct the messages that the protocol requires them to send.
Consider the following variants of the Needham-Schroeder Public-Key Protocol and identify the ones that are executable AND do not suffer from the man-in-the-middle attack.
A - B: {N1, N2, A}x,
B → A : {N1, N2, N3, B}x,
A → B: {N1, N2}x,
a.
b. A - B: {N1, A}x,
В - А: (NI,N2, В}к.
A → B: {N1, N2}x,
c. A - B: {N1, A}x,
B → A : {NI, A, N2, N3, B}K,
A → B : {N2, N3}x,
d. A - B: {N1, A}x,
B → A : {N2, N1, B}K,
A → B: {N2}x,
e. A - B: {NI, A}x,
B → A : {N1, N2, B}x,
O f. A- B: {NI, B}x,
B → A : {NI, B,N2}x,
A - B: {N2}x,
Transcribed Image Text:Recall that a protocol specification is said to be non-executable when the principals cannot construct the messages that the protocol requires them to send. Consider the following variants of the Needham-Schroeder Public-Key Protocol and identify the ones that are executable AND do not suffer from the man-in-the-middle attack. A - B: {N1, N2, A}x, B → A : {N1, N2, N3, B}x, A → B: {N1, N2}x, a. b. A - B: {N1, A}x, В - А: (NI,N2, В}к. A → B: {N1, N2}x, c. A - B: {N1, A}x, B → A : {NI, A, N2, N3, B}K, A → B : {N2, N3}x, d. A - B: {N1, A}x, B → A : {N2, N1, B}K, A → B: {N2}x, e. A - B: {NI, A}x, B → A : {N1, N2, B}x, O f. A- B: {NI, B}x, B → A : {NI, B,N2}x, A - B: {N2}x,
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY