Quizz 4 Question 6

Quizz 4 Question 6

by Antoine Bergerault -
Number of replies: 3

Hello,

For this question, I don't understand how it is possible that this communication method achieves authenticity.

In fact, if we have access to the communication channel between Alice and Bob, wouldn't it be possible to simply delete the packet and create a new one matching the protocol since all the keys used here are either freshly created or public? And in that case, Bob will not be able to know who is the actual sender of the packet


Thanks in advance


Tags:
In reply to Antoine Bergerault

Re: Quizz 4 Question 6

by Noppawit Lertutsahakul -
I had the exact same idea.
With this method, Bob cannot prove that he is talking to Alice.
Anyone can know Bob's public key, anyone can generate the shared key.
In reply to Antoine Bergerault

Re: Quizz 4 Question 6

by Lars Martin Barmettler -


so i took all of the above and it was also false ^^
so i took all of the above and it was also false ^^a


In reply to Lars Martin Barmettler

Re: Quizz 4 Question 6

by Katerina Argyraki -
Thanks for discussing, folks. You are right, of course. The correct answer was "Confidentiality", but it was incorrectly marked on Moodle. Now it has been fixed.