In a system using public-key cryptography, site B wants to fool C by impersonating A. B waits until A requests to communicate with B. A does this by sending an “I want to communicate” message to B, stating its name (A) and encrypted with B’s public key. Then B springs the trap. It sends an “I want to communicate” message to C claiming it is A and encrypted with C’s public key. To ensure that it is actually communicating with A, C replies (to B) with a message obtained by encrypting a large random number, N , w ith A’s public key. If C gets a response containing N + 1 encrypted with C’s public key, it would like to conclude that the responder is A because only A could have decrypted C’s message. C gets such a response. However, this conclusion is wrong because the

response comes from B. Explain howthis could have happened. (Hint: The protocol can be corrected if the encrypted text of each message includes the name of the sender.)

What will be an ideal response?

C replied to B (thinking it was A). When B gets the encrypted message, containing N , it cannot decrypt it, but it sends the message to A using the same protocol. A ecrypts the message and encrypts N + 1 w ith B’s public key since it is trying to complete the protocol with B. B decrypts the message, re-encrypts it with C’s public key, and sends it to C.
If the protocol requires that the encrypted text of each message includes the name of the sender, A would know the message it received from B was constructed by C and not by B.

Computer Science & Information Technology

You might also like to view...

What is the SYSVOL folder used for on a Windows Server 2016 system?

A. It is the system volume containing system related files. B. It is the location of scripts, GPOs, and software distribution files related to Active Directory. C. It is the system variable assigned to whatever becomes the C:\ drive once the system is booted. D. It is the temporary volume used by the system when booting the OS.

Computer Science & Information Technology

The usual way to create interactive buttons is to use a graphics program to create two or more images for each navigation element and then write JavaScript code to control the change in appearance.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology