Consider the authentication protocol below, which is based on knowledge of a shared 4-digit PIN number. Here, -KPIN= h(PIN).
Suppose that Trudy passively observes one iteration of the protocol. Can she then determine the 4-digit PIN? Justify your answer.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here