Search for question
Question

158 CHAPTER 4/KEY DISTRIBUTION AND USER AUTHENTICATION

4.6 Consider a one-way authentication technique based on asymmetric encryption:

A-B: IDA

BA: R₁

AB: E(PR, R₁)

a. Explain the protocol.

b. What type of attack is this protocol susceptible to?

Fig: 1