1. Engineering
  2. Computer Science
  3. replay attack problem please provide an explanation of the answer...

Question: replay attack problem please provide an explanation of the answer...

Question details

Replay Attack Problem:

Please provide an explanation of the answer, please!

Replay Attacks On Monday, Alice uses trusted third party Cathy to establish a secure communication session with Bob. The picture below shows the messages used to establish a shared key and show the complete conversation between Alice and Bob. f request for se ssion key to Bob )kA 1 Alice 2 Alice 3 Alice Cathy Cathy Bob { Charge an iPhone X to my credit card 12345678 { I placed your order and it will arrive tomorrow? ķs { Thanks. This session is now complete.) ks 4 Alice and have it delivered to my house ks Bob 5 Alice 6 Alice 7 Alice Acknowledged. Im discarding key ķjks Notation: (msg) kg indicates msg was encrypted with key kB Bob Ks BobEve observes and records all the messages exchanged. Eve also observes that a package arrived at Alices house the next day and suspects the message exchange caused the package to be delivered. Eve knows Alice going on vacation Friday and Eve could easily pick up any package left at Alices door. On Saturday, Eve attempts a replay attack. Given the message exchange above, can Eve launch a successful replay attack? O Yes, Eve can replay the messages starting from message 3. No, Eve cannot launch a replay attack. O Yes, Eve can replay the messages starting from message 1 O Yes, Eve can replay the messages starting from message 4.

Solution by an expert tutor
Blurred Solution
This question has been solved
Subscribe to see this solution