We say that Trudy is a passive attacker if she can only observe the messages sent between Alice and Bob. If Trudy is also able to insert, delete, or modify messages, we say that Trudy is an active attacker. If, in addition to being an active attacker, Trudy is able to establish a legitimate connection with Alice or Bob, then we say that Trudy is an insider. Consider IKE Phase 1 digital signature main mode.
a. As a passive attacker, can Trudy determine Alice's identity?
b. As a passive attacker, can Trudy determine Bob's identity?
c. As an active attacker, can Trudy determine Alice's identity?
d. As an active attacker, can Trudy determine Bob's identity?
e. As an insider, can Trudy determine Alice's identity?
f. As an insider, can Trudy determine Bob's identity?