QUESTION 4 [CLO-6]In the following key distribution protocol state what would happen if r in step 1 was removed. 1. A-> KDC A.B.r where r is a new random value 2. KDC ->A: (A.B.r. K AB, (A.B,K AB}K_B)K_A 3. A-> B A.B. (A.B.K AB)K_B O Replay Attack O Reflection Attack O Man In the Middle Attack O No Attack

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
QUESTION 4
[CLO-6]In the following key distribution protocol state what would happen if r in step 1 was removed.
1. A-> KDC A.B.r wherer is a new random value
2. KDC --> A: (AB.r. K AB, (A.B,K AB}K_B)K_A
3. A-> B. A.B. (A.B.K AB}K_B
O Replay Attack
O Reflection Attack
O Man In the Middle Attack
No Attack
QUESTION 5
(CLO-6]In the following key distribution protocol state what would happen if step 2 was
(K AB}K_A, (K_AB}K_B
1. A- KDC A.B.r where r is a new random value
2. KDC-A: (A.B.r. K AB, (A.B.K AB)K_B)K_A
3. A-> B: A.B. (A.B.K AB)K_B
O Replay Attack
O Reflection Attack
O Man In the Middle Attack
No Attack
QUESTION S
LO-6JIn the following key distribution protocol state what would happen if step 2 was removed and replaced with : AB.
AB)K A, (K AB)K_B
A→KDC: AB.r where r is a new random value
KDC -A (A.B.r. K AB. (AB.K AB)K B)K A
BAB (A.B.K AB)K B
Replay Attack
Reflection Attack
Man In the Middle Attack
o Attack
QUESTION 6
CLO-6]ln the following key distribution protocol state what would happen if 3 was replaced with A,B, (K_AB)K_B
A-> KDC: A,B.r where r is a new random value
KDC --> A: (A.B.r, K AB. (A.B.K AB}K_B}K_A
A-> B: A.B. (A.B,K AB}K_B
O Replay Attack
D Reflection Attack
D Man In the Middle Attack
D No Attack
Transcribed Image Text:QUESTION 4 [CLO-6]In the following key distribution protocol state what would happen if r in step 1 was removed. 1. A-> KDC A.B.r wherer is a new random value 2. KDC --> A: (AB.r. K AB, (A.B,K AB}K_B)K_A 3. A-> B. A.B. (A.B.K AB}K_B O Replay Attack O Reflection Attack O Man In the Middle Attack No Attack QUESTION 5 (CLO-6]In the following key distribution protocol state what would happen if step 2 was (K AB}K_A, (K_AB}K_B 1. A- KDC A.B.r where r is a new random value 2. KDC-A: (A.B.r. K AB, (A.B.K AB)K_B)K_A 3. A-> B: A.B. (A.B.K AB)K_B O Replay Attack O Reflection Attack O Man In the Middle Attack No Attack QUESTION S LO-6JIn the following key distribution protocol state what would happen if step 2 was removed and replaced with : AB. AB)K A, (K AB)K_B A→KDC: AB.r where r is a new random value KDC -A (A.B.r. K AB. (AB.K AB)K B)K A BAB (A.B.K AB)K B Replay Attack Reflection Attack Man In the Middle Attack o Attack QUESTION 6 CLO-6]ln the following key distribution protocol state what would happen if 3 was replaced with A,B, (K_AB)K_B A-> KDC: A,B.r where r is a new random value KDC --> A: (A.B.r, K AB. (A.B.K AB}K_B}K_A A-> B: A.B. (A.B,K AB}K_B O Replay Attack D Reflection Attack D Man In the Middle Attack D No Attack
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY