Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Problem: Consider the following protocol used by two parties A (Alice) and B (Bo

ID: 3882466 • Letter: P

Question

Problem: Consider the following protocol used by two parties A (Alice) and B (Bob) to send a message from A to B.

        1.   A    to   B   : M1 = M (XOR) NA where NA is A’s nonce (a randomly selected number)

         2. B    to   A   : M2 = M1 (XOR) NB where NB is B’s nonce

         3.   A    to   B   : M3 = M2 (XOR) NA

a) Show that how B can recover M.

b) Is the system secure? Try whether someone with knowledge of M1, M2, and M3 can retrieve M. Defend your answer. (Note: The notation A   to    B means A sends to B) [Cryptographic Protocol from Applied Cryptography]

Explanation / Answer

B receives M3 = M2 (XOR) NA . So B knows M2 and M3 both so B can find out NA.
Once B has NA then, B knows M1

M1 = M (XOR) NA

From here, M can be found out since both M1 and NA are known.

The system is NOT secure because knowing M1, M2 and M3, the attacker can find out NA and NB by bruteforce and once NA and NB are known, it is very easy to figure out M.

M3 = M2 (XOR) NA

so attacker gets NA

M2 = M1 (XOR) NB

so attacker gets NB

Now attacker has both NA and NB, so system is not secured.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote