subject

We consider the following protocol for communication between two parties (i. e., user A and user B) in a company’s computer network so that user A can send a message M to user B: 1. A sends B the block: (, (, ), ) 2. B acknowledges receipt by sending to A the block: (, (, ), ) Note: Blocks exchanges are in the following format: sender’s name, text, receiver’s name. Now, we consider that an adversary C, who is also one of the network’s user (i. e., user C), is able to intercept messages exchanged between A and B. Being a user of the network, the adversary has his own public key, , and private key, , and is able to send his/her own messages to A or to B and to receive theirs. With the help of the above protocol, the adversary could obtain the message M that A has previously sent to B using a 4-step procedure. The first step of the 4-step procedure is that the adversary C intercepts the block sent by A to B. Thus, the adversary holds the block: (, (, ), ). What are the next 3 steps so that the adversary C can get the message M?

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 19:20, khenalilovespandas
Number of megabytes of ram in a computer. qualitative or quantitative? because
Answers: 3
image
Computers and Technology, 22.06.2019 00:10, MadiAbbott798
How does access indicates that a filter has been applied to a specific column
Answers: 1
image
Computers and Technology, 23.06.2019 22:00, elijah1090
Technician a says engine assemblies can be mounted longitudinally in a chassis. technician b says engine assemblies can be mounted transversely in a chassis. who is correct?
Answers: 2
image
Computers and Technology, 24.06.2019 00:00, BluedragonKBT44
The gene form of a trait is called a(n) 
Answers: 2
You know the right answer?
We consider the following protocol for communication between two parties (i. e., user A and user B)...

Questions in other subjects:

Konu
Mathematics, 30.06.2019 14:30
Konu
Mathematics, 30.06.2019 14:30