A reporter, Alice, is following the secret plan. Alice gets a copy of Bobs publi
ID: 3547310 • Letter: A
Question
A reporter, Alice, is following the secret plan. Alice gets a copy of Bobs public key but she does not know the private key of Bob. One night, Alice uses her laptop to eavesdrop on the message that David sends to Bob. She gets a copy of the encrypted message. Please illustrate how Alice can use forward search attack to figure out which two states David will visit tomorrow.
2. Please shortly explain the concepts of session keys and interchange keys.
3. Please shortly explain what is salt in a password system. Also, please explain how salt helps to defend against dictionary based password attack.
Explanation / Answer
1) If the message space is small, the attacker can create a dictionary of encrypted messages (public key known, encrypt all possible messages and store them). When the attacker
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.