Consider the following mutual authentication and key establishment protocol, where the session key is given by K = gabmod p.
Suppose that Alice attempts to initiate a connection with Bob using this protocol.
a. Show that Trudy can attack the protocol so that both of the following will occur.
i. Alice and Bob authenticate each other.
ii. Trudy knows Alice's session key. Hint: Consider a man-in-the-middle attack.
b. Is this attack of any use to Trudy?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here