Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Suppose the following challenge-response protocol is used by two parties which s

ID: 3829341 • Letter: S

Question

Suppose the following challenge-response protocol is used by two parties which share a secret K to mutually authenticate each other:

ALICE BOB

--------------------------->>> I'm Alice

R <<<------------------------

------------------------->>> {R}K

The figure shows how Alice authenticates herself to Bob, but Bob can authenticate himself to Alice in a similar way (i.e., exchanging the roles of Alice and Bob in the figure). After authentication, the two parties want to set up a session key. Which of the following are secure to be used as a session key? For those not secure, explain why.

1) K XOR R;

2) EK(R+K);

3) EK(K+1);

4) EK+R(R)

Explanation / Answer

1. K XOR R : Insecure session key as it is possible to arrive at a combination of X and Y such that K!=X and R!=Y and X XOR Y = K XOR R and this would result in an insecure session, as the session key could be cracked.

2. EK(R+K): Secure session key, extremely difficult to factorize

3. EK(K+1): Doesnot contain a component that is a multiple of 'R', that represents authentication of Alice. Insecure session key, would not be unique to a session also. Hence, each session would not be safe from data gathered in other sessions.

4. EK + R(R): Secure session key, extremely difficult to factorize

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote