subject
Engineering, 18.10.2019 19:30 Jojoahmed99

1suppose alice, bob, and carol want to use secret key technology to authenticate each other. if they all used the same secret key k, then bob could impersonate carol to alice (actually any of the three can impersonate the other to the third). suppose instead that each had their own secret key, so alice uses ka, bob uses kb and carol uses kc. this means that each one to prove his or her identity responds to a challenge with a function of his or her secret key and the challenge. is this more secure than having them all use the same secret key k?

ansver
Answers: 2

Another question on Engineering

question
Engineering, 04.07.2019 18:10
Slip occurs via two partial dislocations because of (a) the shorter path of the partial dislocation lines; (b) the lower energy state through partial dislocations; (c) the charge balance.
Answers: 1
question
Engineering, 04.07.2019 18:10
Which of the following refers to refers to how well the control system responds to sudden changes in the system. a)-transient regulation b)- distributed regulation c)-constant regulation d)-steady-state regulation
Answers: 1
question
Engineering, 04.07.2019 19:10
What is a monomer? how do they form a ploymer from the view point of chemical bonding?
Answers: 1
question
Engineering, 04.07.2019 19:10
Asteel wire of 2 mm diameter is fixed between two points located 2 m apart. the tensile force in the wire is 250n, if its density of steel is given by 7830 kg/m3 the fundamental frequency of vibration hz? ?
Answers: 3
You know the right answer?
1suppose alice, bob, and carol want to use secret key technology to authenticate each other. if they...
Questions
question
Mathematics, 07.04.2020 17:52
question
Health, 07.04.2020 17:52
Questions on the website: 13722363