Does this protocol authenticate bob to alice

Assignment Help Basic Computer Science
Reference no: EM131310285

1. An X.509 certificate revocation list contains a field specifying when the next such list is expected to be issued. Why is that field present?

2. Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates a random message r, enciphers it with the key k she shares with Bob, and sends the enciphered message {r}k to Bob. Bob deciphers it, adds 1 to r, and sends {r + 1}k back to Alice. Alice deciphers the message and compares it with r. If the difference is 1, she knows that her correspondent shares the same key k and is therefore Bob. If not, she assumes that her correspondent does not share the key k and so is not Bob. Does this protocol authenticate Bob to Alice? Why or why not?

Reference no: EM131310285

Questions Cloud

Principles in a business environment : You are to complete a minimum 500-word essay in which you describe resource pooling architecture and how you would apply these principles in a business environment.
Compute the monthly amount of real estate taxes : Compute the down payment, amount financed, and the monthly mortgage payment. Compute the monthly amount of real estate taxes and add to the monthly mortgage payment to get the total monthly amount paid.
Discuss the major supply chain aps applications : Discuss the major supply chain APS applications with particular focus on the role and anticipated benefits for each application.
Identify and discuss the major forecast components : Identify and discuss the major forecast components. Why is it important to decompose demand into these components when developing new forecasts?
Does this protocol authenticate bob to alice : If not, she assumes that her correspondent does not share the key k and so is not Bob. Does this protocol authenticate Bob to Alice? Why or why not?
Differentiator of time series and causal forecast techniques : Compare and contrast the basic logic differentiator of time series and causal forecast techniques. Under what conditions would each be appropriate?
Understanding and full development of the concepts : Must be 100-200 words and show an understanding and full development of the concepts. Must be substantive, clear, and informative (provide support).
How a minor change in demand at the retail level : Discuss how a minor change in demand at the retail level can significantly impact supply chain variation at distributors, manufacturers, and suppliers.
Creating a new sales and inventory management system : Creating a new sales and inventory management system for pet supply store. System allows 1) sales orders to be entered by clerk, 2) total price calculated and 3) inventory updated.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Descriptor describes a memory segment

The above segment descriptor describes a memory segment in terms of its start address, its size and whether it is ALLOCATED or FREE. This descriptor is part of a list (contains a pointer to next segment descriptor). Initially, there is only one se..

  Evaluate the computation accuracy of the network

Evaluate the computation accuracy of the network by using the test data

  Can you find a circuit for the same function

Redraw the circuit diagram of a CMOS 3-state buffer in Figure 3-49 using actual transistors instead of NANO, NOR, and inverter symbols. Can you find a circuit for the same function that requires a smaller total number of transistors? If so, draw i..

  How can we optimize implementation of map interface

How can we optimize implementation of Map interface in Java, and is there any other alternative to it

  Distinguish between concurrent and simultaneous

Distinguish between concurrent and simultaneous. A single processor can execute two or more programs concurrently but not simultaneously

  Application of the proposed approach

Describe the application of the proposed approach in different case studies. Depict a cutout of the CoCoME architecture and design models and show a violation of this architectural aspect. Show a fictitious violation of this concept in the CoCoME s..

  Describing the features of the different computers

describing the features of the different computers such as memory, processor, monitor/screen size, operating system, etc. In the summary include the following

  Find and change the duration parameter to make the rabbit

The method will open in the Editor area. Find and change the duration parameter to make the rabbit jump more quickly or more slowly.

  Block-structure language

Why is Progress language considered as block-structure language?

  Preventing the type of attack

Deccan Herald titled Hackers holding your PC to ransom Propose two (2) methods that computer users could use to prevent this type of attack.

  Describe the graph pictured above

Show the adjacency matrix that would describe the edges in this graph. Store the vertices in alphabetical order.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd