subject
Engineering, 18.10.2019 19:30 Jojoahmed99

1suppose alice, bob, and carol want to use secret key technology to authenticate each other. if they all used the same secret key k, then bob could impersonate carol to alice (actually any of the three can impersonate the other to the third). suppose instead that each had their own secret key, so alice uses ka, bob uses kb and carol uses kc. this means that each one to prove his or her identity responds to a challenge with a function of his or her secret key and the challenge. is this more secure than having them all use the same secret key k?

ansver
Answers: 2

Another question on Engineering

question
Engineering, 03.07.2019 14:10
Explain the difference laminar and turbulent flow. explain it with the shear stress and the velocity profiles.
Answers: 1
question
Engineering, 03.07.2019 14:10
When at a point two solid phase changes to one solid phase on cooling then it is known as a) eutectoid point b) eutectic point c) peritectic point d) peritectoid point
Answers: 3
question
Engineering, 03.07.2019 14:10
Line joining liquid phase with liquid and solid phase mixture is known as: a) liquidus b) solidus c) tie line d) none of the mentioned
Answers: 2
question
Engineering, 04.07.2019 08:10
Which of the following is an easy way to remember the modified “x” tire rotation? a. nondrive wheels straight, cross the drive wheels b. drive wheels straight, cross the nondrive wheels c. drive wheels crossed, nondrive wheels straight d. drive wheels crossed, nondrive wheels crossed
Answers: 1
You know the right answer?
1suppose alice, bob, and carol want to use secret key technology to authenticate each other. if they...
Questions
Questions on the website: 13722363