Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A reporter, Alice, is following the secret plan. Alice gets a copy of Bobs publi

ID: 3547310 • Letter: A

Question



A reporter, Alice, is following the secret plan. Alice gets a copy of Bobs public key but she does not know the private key of Bob. One night, Alice uses her laptop to eavesdrop on the message that David sends to Bob. She gets a copy of the encrypted message. Please illustrate how Alice can use forward search attack to figure out which two states David will visit tomorrow.




2. Please shortly explain the concepts of session keys and interchange keys.





3. Please shortly explain what is salt in a password system. Also, please explain how salt helps to defend against dictionary based password attack.


Explanation / Answer

1) If the message space is small, the attacker can create a dictionary of encrypted messages (public key known, encrypt all possible messages and store them). When the attacker

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote