CS5460 Assignment4
CS5460 Assignment4
Additional questions: 1. Explain how to use (a) a shared secret and (b) public/private keys, to authenticate two communicating parties. 2. In the class we asserted it is extremely difficult, without public key cryptography, to have an authentication scheme which protects against both eavesdropping and server database disclosure. Consider the following authentication protocol (based on Novell version 3 security). Alice knows a password. Bob, a server that will authenticate Alice, stores a hash of Alices password. Alice types her password (say, fiddlesticks) to her workstation. The following exchange takes place:
Is this an example of an authentication scheme that isnt based on public key cryptography and yet guards against both eavesdropping and server database disclosure? 3. In mutual authentication, we discussed the reflection attack and note that Protocol 11-8 is susceptible to it, but Protocol 11-7 is not. How about Protocol 11-11? (see following)
4. In class we discussed several possibilities for forming a session key. Remember that R is the challenge sent by Bob to Alice, and K (or KAlice-Bob) is the shared secret between Alice and Bob. Which of the following are secure for a session key? { } ; { } ; { } The following was the authentication protocol we discussed for shared secret:
;