Data Protection and Security

   

VII

Identification and Entity Authentication

   

VII.III

Authentication Protocols

   

   
 

 

   

VII.III.II Q

[+] Question

[-] Question

What if the clocks Alice and Bob have are not synchronized?

   

VII.III.III Q

[+] Question

[-] Question

Unlike previous protocol, in its current form this protocol can only be implemented by an encryption algorithm and not by a one-way hash function. Why? Show a modification so that one-way hash functions can also be used.

   

VII.III.IV Q

[+] Question

[-] Question

There are also public key versions of two protocols we have seen. For instance in Figure 5, you can see a challenge response protocol based on public key signatures. There is another variant based on public key encryption. Can you draw it?

Figure 5. Challenge-Response protocol based on public key signatures.

   

   
       
 
«previous session [1] [2] [3] [4] [5] [6] [7] [8] [9] next session »
   
       
 
«proceed to previous sectionproceed to next section »
  chapter index