subject
Mathematics, 28.06.2019 09:30 bryson9604

Assume that a and b share a long-term 256-bit aes key k. our key exchange protocol has two goals: (1) let a and b agree on a new fresh session key ks to be used for a current session, and (2) perform mutual authentication. nb is a nonce and ks is a new session key generated by b. assume that ks and nb are of the same bit-length and both are always chosen at random. denotes aes encryption of everything inside () with key k. denotes sha2-based hmac of everything inside () using key k. protocol: 1. a > b: ek(a, b, "hello") what (if any) are the vulnerabilities of this protocol? and, how can you fix them? again, keep your answers limited to 8-10 lines.

ansver
Answers: 3

Another question on Mathematics

question
Mathematics, 21.06.2019 19:00
Write the pair of fractions as a pair of fractions with a common denominator
Answers: 3
question
Mathematics, 21.06.2019 20:20
The surface area of the triangular prism is .
Answers: 1
question
Mathematics, 21.06.2019 22:30
Tommy buys a sweater that is on sale for 40% off the original price. the expression p -0.4p can be used to find the sale price of the sweater, where p is the original price of the sweater. if the original price of the sweater is 50, what is the sale price?
Answers: 1
question
Mathematics, 21.06.2019 22:30
Bob the builder is making 480kg of cement mix. this is made by cement, sand and gravel in the ratio 1: 3: 4
Answers: 3
You know the right answer?
Assume that a and b share a long-term 256-bit aes key k. our key exchange protocol has two goals: (...
Questions
question
Mathematics, 22.05.2020 00:02
Questions on the website: 13722362