29 Questions
What is the goal of the authentication protocol in ap3.1?
To authenticate Alice's identity
What is the purpose of the Authentication number in the protocol?
To confirm the agency's authority
What is the requirement for the Authentication number in ap4.0?
It must be used only once in a lifetime
How does Alice prove she is 'live' in ap4.0?
By returning R, encrypted with a shared secret key
What is the limitation of ap4.0?
It requires a shared symmetric key
What is the motivation behind ap5.0?
To use public key techniques for authentication
What is the password to enter Moria in the context of J.R.R. Tolkien's story?
Mellon
What is the primary goal of authentication in the context of network communication?
To prove one's identity
What is the flaw in Protocol ap2.0?
Trudy can create a packet spoofing Alice's address
What type of attack can be launched against Protocol ap3.0?
Replay attack
What improvement does Protocol ap3.1 offer over Protocol ap3.0?
Alice's password is encrypted
Why is Protocol ap1.0 not secure?
Trudy can simply declare herself to be Alice
What is the primary purpose of a trusted CA in the SSL protocol?
To enable the browser to extract the server's public key from the certificate
What is the primary weakness in the ap5.0 protocol?
The distribution of public keys
What is the symmetric session key used for in the SSL protocol?
To encrypt all data sent into the TCP socket
What is the purpose of a Key Distribution Center (KDC)?
To act as a trusted intermediary between entities
What is the benefit of using client certificates in SSL?
It enables the server to authenticate the client
What is the problem with public key cryptography?
It is difficult to verify the authenticity of the public key
What is the relationship between SSL and TLS?
SSL is the basis for TLS
What is the role of a Trusted Certification Authority (CA)?
To verify the authenticity of public keys
What is an example of a non-Web application that can use SSL?
IMAP
What is the primary function of a Certificate Authority (CA)?
To bind public keys to particular entities
How does a KDC enable Alice and Bob to communicate with each other?
By establishing a shared symmetric secret key
What is the symmetric key problem?
How to establish a shared secret key over a network
What does Alice use to obtain Bob's public key?
Bob's certificate and CA's public key
What is the purpose of a digital signature in a certificate?
To ensure the integrity of the certificate
What is the primary goal of the Key Distribution Center (KDC) in the KA-KDC protocol?
To distribute session keys for symmetric encryption
What is the primary benefit of using SSL in web browsers?
To provide transport layer security for TCP-based applications
What information does a certificate contain?
All of the above
Learn about authentication protocols and goals, including difficulties in verifying identities online. Discover how Alice can prove her identity to Bob in a network.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free