subject

Alice to bob ­ - "i’m alice", {ra}bob

bob to alice ­ - {ra, rb}alice

alice to bob ­- e(rb, k)

where ra and rb are the nonces (respectively from alice and from bob), k is the shared symmetric key.

{} is encryption with specified public key.

is encryption with specified private key.

if k = h(ra ,rb ). does this protocol provide for plausible deniability? if so, why? if not, slightly modify the protocol so that it does, while still providing mutual authentication and a secure session key.

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 00:30, vane3152
If joey was single and his taxable income was $9,500, how much would he pay in taxes each year?
Answers: 1
image
Computers and Technology, 23.06.2019 02:30, chaaaa
People with high self-esteem: accept their strengths and weaknesses. believe that failed experiences are failures of their whole self. feel good about who they are only when they reach total success. need positive external experiences to counteract negative feelings that constantly plague them.
Answers: 1
image
Computers and Technology, 23.06.2019 16:00, cravens511peeelg
An english teacher would like to divide 8 boys and 10 girls into groups, each with the same combination of boys and girls and nobody left out. what is the greatest number of groups that can be formed?
Answers: 2
image
Computers and Technology, 24.06.2019 06:30, toolazytobehuman
Me and category do i put them in because this is science
Answers: 1
You know the right answer?
Alice to bob ­ - "i’m alice", {ra}bob

bob to alice ­ - {ra, rb}alice

alice t...

Questions in other subjects: