Jump to content

Recommended Posts

Posted

Please help to advice which of the following protocols are insecure against replay attack, and explain why.

(a) A ! B: username, password

(B) A ! B: username, h(timestamp, password)

© A ! B: username, timestamp, h(password)

(d) A ! B: username, h(password), h(timestamp)

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.