You are on page 1of 2

1.

Tomaketheprotocolmoresecure,changeK
tohash(Alicespassword)
AB
6.
a. Primaryadvantageisthatitusesfewermessagesovernonce
b. Disadvantageisthatitislesssecuresothatifthetimecanbecompromised
7.
a. Aliceisnoteverauthenticatedsinceshedidnotprovideacertificate
b. Bobisauthenticatedbecauseheprovidedthecertificate
10.
a. Thisisnotsecure.SinceRissentintheclear,anyoneeavesdroppingcanpickup
RanduseittogetKbydoingthefollowing:RXOR
b. Thisissecure,sinceKisknownonlytoAliceandBob.
c. ThisisnotsecureasRissentintheclear.AneavesdroppercanuseRtogetK
sinceEisasymmetricencryptionscheme(andalsobecauseweassumethat
theschemeisknown).
d. Thisissecureassumingthataneavesdropperdoesnothaveaccesstoinfinite
computationalpower.Ifhedid,thenhecouldcreateatableforeverypossible
hashvalueofKusingRandcomparetofindthepossiblevalueofK.
e. Thisissecureassumingthataneavesdropperdoesnothaveaccesstoinfinite
computationalpower.Ifhedid,thenhecouldcreateatableforeverypossible
hashvalueofRusingKandcomparetofindthepossiblevalueofK.
16.Youcanusethereplayattacktoattackthisprotocol.Tomakeitmoresecure,you
shouldsignandencrypt
21.
a. 1/2
b. Youcansignandencryptorencryptandsign
22.
b
a
a. YoucanusetheManinthemiddleattacksothatTrudyinterceptstheg
andg

andsendbackherownkey.
b. YesitisofusetoTrudy
29.
a. Yes,shecandetermineusingbruteforce
b. YesbecausethatmeanthatTrudyhastocomputea2^256possibility.

30.NosinceR
wasencrypted
A
36.
a. NosincevisnotequaltoFigure9.32
b. Yesbecausethereisonly1iteration
c. S=37

You might also like