1. Engineering
  2. Computer Science
  3. replay attack problem please provide an explanation of the answer...

Question: replay attack problem please provide an explanation of the answer...

Question details

Replay Attack Problem:

Please provide an explanation of the answer, please!

Replay Attacks On Monday, Alice uses trusted third party Cathy to establish a secure communication session with Bob. The picture below shows the messages used to establish a shared key and the start of a conversation between Alice and Bob. You may assume both Alice and Bob discard Ks at the end of the conversation. Alice | Bob r1 1 Alice 2 Alice 3 Alice 4 Alice 5 Alice Cathy Cathy Bob (Alice || Bob I| r1 ll k, |l (Alice || ks ) kg) KA (Alice |I k) ka Bob Bob Charge an iPhone X to my credit card 12345678 and have it delivered to my house) ks 6 Alice BobEve observes and records all the messages exchanged. Eve also observes that a package arrived at Alices house the next day and suspects the message exchange caused the package to be delivered. Eve knows Alice going on vacation Friday and Eve could easily pick up any package left at Alices door. Eve uses a cryptanalytic attack and is able to learn Ky On Saturday, Eve attempts a replay attacik. Given the message exchange above, can Eve launch a successful replay attack? O Yes, Eve can replay the message 3, can produce a new message 5, and then can ask a new iPhone and iPad be delivered to Eves house. O Yes, Eve can replay the message 3, can produce a new message 5, and but then the only messages Bob will believe is a request to buy an iPhone X that will be delivered to Alices house. O Yes, Eve can replay the message 1. O No, Bob has chosen a new random number r2 so Eve cannot computer r2-1

Solution by an expert tutor
Blurred Solution
This question has been solved
Subscribe to see this solution