Consider a one-way authentication technique based on asymmetric encryption: A --> B: IDA B --> A: R1 A --> B: E(PRa, R1) Explain the protocol. What type of attack is this protocol susceptible to?

Respuesta :

Answer:

See explaination

Explanation:

A protocol in computing can be defined as a standard set of rules that allow electronic devices to communicate with each other. These rules include what type of data may be transmitted, what commands are used to send and receive data, and how data transfers are confirmed. You can think of a protocol as a spoken language.

Please kindly check attachment for for the details of the answer.

Ver imagen kendrich

 (a) Protocol working

Here, A-->B : ID means protocol is issued authentic A to B.

  • Then B--> A : R1 here, R1 take care about only A can encrypt R1 ensure that only A can take authentication challenge.
  • Last A--> B : E (PRa, R1) here, A's public key is take care to decrypt.

(b). According to the question it is based on asymmetric key encryption technique, Let us assume any third-party K could use the given below assumption:

  • Let us suppose A sign a message, and this message, K show to any other party D.
  • so, in this case if A used public or private key for authentication and signature.
  • Then, in this case attacks occurrence chance is happen, so man middle attack will be happen.

Learn more about:

https://brainly.com/question/17495888