Ask Question
30 July, 21:30

1 Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key K, then Bob could impersonate Carol to Alice (actually any of the three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB and Carol Uses KC. This means that each one to prove his or her identity responds to a challenge with a function of his or her secret key and the challenge. Is this more secure than having them all use the same secret key K?

+4
Answers (1)
  1. 30 July, 23:15
    0
    Explained

    Explanation:

    Alice need to know the secret key of carol to verify the carol's answer to Alice challenges.

    Similarly it needs the secret key of Bob to verify bob's answer to Alice challenge (actually any of the three need others secret key for verify answer to challenge).

    So, Bob could impersonate Carol to Alice as he should know the secret key of Carol to answer Carol's challenge. Hence it is no more secure than having all use the same secret key.

    So, it is no more secure than having them all use the same secret key K.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “1 Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key K, then ...” in 📙 Engineering if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers