Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)

Answers

Answer 1

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.


Related Questions

How can we tell the computer both what to put on
the web page, and how to organize it?

Answers

There is only 1 answer. Code. You have to code the web page if you want to put stuff on it/organize it.

We instruct the computer and tell how to organize the web-page through Coding.

Coding in essence, means the language that instruct computer and these are used to develop application, websites, software and so on.

In order to learn how to code, you must follow certain procedure:

Learning the Basics of HTML and Understanding Document Structure Learn about the CSS Selectors Knowing how to put together a CSS Stylesheet etc.

In conclusion, instruction given to computer to organize a Web-page and communication with the system are made possible through coding.

Learn more here

brainly.com/question/19535447

PLEASE HURRY!!!!

What will be the output of the following program? Assume the user responds with a 2.

answer = input ("How many books would you like? ")
priceBook = 3.20
intNumberBooks = float(answer)
moneyDue = intNumberBooks * priceBook
print ("You owe $", moneyDue)

A) You owe $ 6.40
B) An error occurs.
C) You owe $6.40
D) You owe $moneyDue

Answers

Answer:

A or C (depends on your programming language)

Explanation:

When someone replies to the input, "answer" is set to a string containing their reply -- in this case, 2. intNumberBooks is set to the floating-point value of "answer" (which is actually strange, since "int" implies an integer). So if the user responds with 2, intNumberBooks = 2. moneyDue then is set to the price times the number of books:

moneyDue = 2 * 3.20

So it will print moneyDue of $6.40. Whether the answer is A or C, though, depends on the programming language you're using -- I can't tell whether it will print a space after the $ or not, unfortunately.

The output of the given program if assuming the user responds with a 2 is You owe $6.40. The correct option is A.

What is the output?

Data input is required for programs. The program uses (processes) this data, and as a result, data (or information) is output. Any information that a program or other electronic device processes and sends out is considered its output. The output is anything that can be seen on the computer screen, such as the words you type on the keyboard.

When someone responds to an input, the floating-point value of "answer" in number books is set to a string expressing their response, in this case, 2.

Therefore, if the user replies with 2, the money owing is set to the price multiplied by the number of books:

Money Due = 2 x 3.20 = $6.40

Therefore, the correct option is A. You owe $ 6.40.

To learn more about output, refer to the below link:

https://brainly.com/question/28903099

#SPJ5

What is the significance of backing up data on a computer?

Backing up data allows you to browse the Internet more quickly.
Your computer will never become infected with a virus.
A copy of your work can be saved in case the computer crashes.
The web cache will be cleared regularly.

Answers

Answer:

the answer is c

Explanation:

i got it right

Answer:

c

Explanation:

edg2020

what is the use of form in HTML​

Answers

Answer:

to make the internet faster

Explanation:

becuase it will have a faster act on the computer so the computer could process the information for it later to be used

write a program that accepts three decimal numbers as input and outputs their sums?​

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

The code is written in C++ language:

// Example program

#include <iostream>

#include <string>

using namespace std;

int main()

{

 double number [3];

 double addition=0;

 for (int i=0;i<3;i++)

 {

     cout<<"Enter decimal number at position " <<i+1< " ";

     cin>>number[i];

     addition= addition+ number[i];

           

     }

 cout<<"The addition is "<<addition;

}

Compare and contrast frame header to internet protocol header.

Answers

A Frame Header is known to have the source and the destination addresses of all the frame and the control bytes while the  IP header is known to be the header information at the start of an Internet Protocol packet.  

The IP packets is made up of a header that is used for addressing and routing.

What is IP header?

This type of header is known to have the source address and the destination address.  IP is known to be one that uses an Internet datagram that has all the information that are the same to the physical frame.

A frame is regarded as the unit of transmission that is found on a link layer protocol. It is made up of a link layer header that is known to be followed by a packet.

Learn more about  IP header from

https://brainly.com/question/4297610

Database policies should be created and implemented by all organizations, regardless of the ________ of the organization.

Answers

Database policies should be created and implemented by all organizations, regardless of the size of the organization.

What are database policies?

A database is a large collection of data that has been formatted to fit a certain standard. Database policies are law, enacted to protect usage of data by an individual, firms or governments.

The advantages of using a database would be that the information found there has been selected by experts in the field, while it also includes scholarly information that has been published or presented for review.

Hence, database policies should be created and implemented by all organizations, regardless of the size of the organization.

Learn more about database policies here: https://brainly.com/question/379106

how can a security framework k assist in the deisng and implementation of a secuiry infrastructure what isn information security governance

Answers

Answer:

on January 1st the new year begins rewrite and punctuate correctly

Which of the following is NOT true about an entrepreneur?

Answers

Answer:

A. An entrepreneur gets to act as his own boss.

Please give crown award and thanks.

Do you think that Aunt Susan needs more than the normal RDA for protein? Why or why not?

Answers

Answer:

Amanda is a 21-year old college student who is minoring in nutrition. While home on break from college, she eats out one day with her Aunt Susan who is 55 years old.Amanda learns that her aunt has been doing basic strength training with a personal trainer twice a week for the past four months. Aunt Susan tells her that she started doing the strength training not because she wants to be a body builder, but because she wants to get in better shape, have stronger muscles and bones, and improve her balance and coordination.At this point, Aunt Susan definitely feels she is in better shape, and also has been paying more attention to her diet. She tells Amanda that her trainer wants her to eat more protein.

Explanation:

A template is usually opened by
O clicking on a slide's thumbnail and choosing a template in the Design tab gallery.
O opening the Design tab and then right-clicking on a thumbnail in the gallery and selecting Apply to All Slides.
O clicking on New under the File tab and then selecting a thumbnail from the Templates gallery.
O opening the File tab and then right-clicking on Save As and selecting Apply to All Slides after picking a template.

Answers

The first answer choice

Answer:

A

Explanation:

BRAINLIEST AND 50 POINTS PLEASE AND FAST FAST FAST FAST FAST!!!!!!
What are three things that the use of color on a website do?

Answers

Answer: Colors can attract the attention of others, create the environment for a website, and it has an impact on how people feel about that website. When you dig into the psychology part of it, there is a variety of different things you can do with color on a website.

Select the correct option that shows a function in F# that receives a list of integers and returns the average value all its elements as a float.
a. let averageList list = List.fold (fun acc elem -> acc + elem) 0 list / float list.Length
b. let averageList list = List.map (fun (acc,elem) -> acc + float elem) 0 list / list.Length
c. let averageList list = List.map (fun acc elem -> acc + elem) 0 list / list.Length
d. let averageList list = List.filter (fun (acc,elem) -> acc + elem) 0.0 list / float list.Length
e. let averageList list = List.fold (fun acc elem -> acc + float elem) 0.0 list / float list.Length

Answers

Answer: acc

Explanation:

Plzzzzzzz help good answers only and best answer gets brainly

Answers

Answer:

Desmos (colab w/h math antics) , Calendar, Quizlet (colab w/h google) , Quizizz (colab w/h quizlet) , Kahoot (colab w/h google) , or Google Translate

Suppose that the WEQ scheduling policy is applied to a buffer that supports three classes, and suppose the weights are 0.5, 0.25, and 0.25 for the three classes. Suppose that each class has a large number of packets in the buffer. In what sequence might the three classes be served in order to achieve the WFQ weights?

Answers

Answer:

The WFQ (Weighted Fair Queuing) scheduling is a circular order a round roubin strategy in ascending order depends on weights.

Assume the three classes weights are 0.5, 0.25, and 0.25 respectively.

If same weight have for two or more classes then give highest order is the first preference class.

The sequence order that the three classes served is :1 2 1 3 1 2 1 3….

Another possible sequence order that the three class are: 1 1 2 1 1 3 1 1 2 1 1…

Explanation:

Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but not Bob) finds out whether her x equals any of Bob's five items; Alice should not find out anything other than the answer ("Yes" or "No") to the above question, and Bob should not know that answer or any secret from Alice. Do not use a hash-based solution because even though the probability of a colission is small, Alice requires that no such colission can occur (but using encryption is fine, because in that case two distinct items that are encrypted with the same key will result in two different ciphertexts).

NOTE: THE SOLUTION FOR THIS SHOULD BE MATHEMATICALLY EXACT.

Answers

The protocol shows that the items of Alice = {x} and the items of Bob = {y1, y2, y3, y4, y5}

How to depict the protocol

The ways to design the protocol will be:

Alice will get Bob's public key.Alice will send a communication to Bob encrypted through Bob's community key.Bob's motivation has a clandestine key.Through the top-secret key, Bob will try to work out the communication.Bob will give a response called yes or no.Bob doesn't know what substances are with Alice.If Alice Alice gets any of the responses as yes then Alice's item is equivalent to any of Bob's five items.If Alice's items are not equal to Bob's items then Alice will get a response as no.

It should be noted that protocol is important for relaying datagrams across the network boundaries.

Learn more about protocol on:

https://brainly.com/question/17062016

Explain the schema to be followed when solving a dp problem

Answers

Answer:

Every Dynamic Programming problem has a schema to be followed: Show that the problem can be broken down into optimal sub-problems. Recursively define the value of the solution by expressing it in terms of optimal solutions for smaller sub-problems. Compute the value of the optimal solution in bottom-up fashion.

Does Rational database software lets you link multiple tables? Yes or no

Answers

Answer:

yes

Explanation:

i did some research but don't take my word for it and let me know if it wrong

Dante has a worksheet shared with multiple users. He would like the ability to approve or reject changes that are made. Which feature should he use? Protection Change Tracking Comments Data Consolidation

Answers

Answer:

Data Consolidation.

Explanation:

Answer:

Change tracking.

Explanation:

It's the only one of the options that tracks anything.

Create a file using any word processing program or text editor. Write an application that displays the fie's name, containing folder, size, and time of last modification. Save the file as FileStatistics.java.

Answers

Answer:

yes

Explanation:

yeah

You use utility software to_____. Select all that apply.

A play video games
B reformat a hard disk drive
C manage fonts on a computer
D write and edit documents

Answers

Utility software is system software designed to help analyze, configure, optimize or maintain a computer. Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates.

You use utility software to:

Reformat a hard disk drive.Manage fonts on a computer.

What are utility software used for?

Utility software are known to be a kind of software that is often used to  configure and maintain any system.

Conclusively, Note that this software is made up of  small programs which can be used to  Reformat a hard disk drive and also to Manage fonts on a computer.

Learn more about  utility software from

https://brainly.com/question/20659068

Typing into a text _____
allows a user to place text on a slide without attaching the text to a visual object.

Answers

Answer:

box

Explanation:

The part of the screen where you write or place code is called the _____.

Answers

Answer:

Screenwriting plz mark me brainliest

Explanation:

Answer:

ground.

Explanation:

im not sure completely. but you above me answered wrong, so this makes most sense.

What is the name of the menu in the bottom left corner of the windows environment?.

Answers

Answer:

Microsoft Windows Start menu

CAR_SALE (Car_no, Date_sold, Agent_no, Commission_pct, Discount_amt)
Assume that a car may be sold by multiple agents, and hence {Car_no, Agent_no} is the primary key. Therefore, a single car sale may occupy multiple tuples.
Additional dependencies are:
Date_sold → Discount_amt and
Agent_no → Commission_pct
Based on the given primary key, is this relation in 1NF, 2NF, or 3NF? Why or
why not? How would you successively normalize it completely? Provide reasoning for each normalization.

Answers

1NF

In 1NF the relation should follow atomicity that means no repeating groups

In the relation there is no repeating groups

So

the relation is in 1NF

2NF

In 2NF, the relation should be in 1NF and each non prime

attribute must depend on primary key and No Partial dependency

Commission% is functional dependent on Salesperson# which is only part of the primary key.

So

relation is not in 2NF

3NF

In 3NF, the relation should be in 2NF and any NON prime attribute should not describe any non prime attribute.

Already we know relation is not in 2NF

there is a non prime attribute date_sold that describe another non prime attribute Discount_amt,

the relation is not in 3NF

Finally we come to. Know

the relation satisfies only 1NF

NORMALIZATION

The relation is not in 2NF

Decompose the relation CAR_SALE

CAR_SALES (Car#, Date_sold, Salesperson#, Discount_amt)

SALESCOMM (Salesperson#, Commission%)

CAR_SALES and SALESCOMM are in 2NF

In 3NF, the relation should be in 2NF and any NON prime

attribute should not describe any other non prime attribute

SALESCOMM relation is in 3NF

but CAR_SALES is not in 3NF the reason is that there is a

non prime attribute Date_sold that describes another non prime attribute Discount_amt.

So, decomposing the relation

CARSALEDATE (car#, salesperson#, Date_sold)

DATEDISS(Date_sold, discount_amt)

The relations CARSALEDATE

SALESCOMM

DATEDIS are in 3NF

Is there a parrapa level for stage 1 in umjammer lammy?

Answers

Answer:yes there WAS a parrapa level but it was scrapped from the game I think you can find it in beta versions of the game but

How can a Word user insert a page break into a document to isolate a table on a new page? Use the drop-down
menus to complete the statements.
1. Place the v at the text that needs editing.
2. Open the
dialog box
3. Select the
v tab.
4. Choose
5. Click OK

Answers

How can a Word user insert a page break into a document to isolate a table on a new page? Use the drop-down menus to complete the statements.

1. Place the  

✔ cursor

at the text that needs editing.  

2. Open the  

✔ Paragraph

dialog box.

3. Select the  

✔ Line and Page Breaks

tab.

4. Choose  

✔ Page break before

.

5. Click Ok.

A Word user can insert a page break into a Word document to enable the insertion of a table on the new page by following these steps.

Place the cursor at the text that needs to be edited. Open the paragraph dialog box Select the line and page breaks tab. Choose page break   Click OK.

Thus, following these mentioned steps will enable the Word user to correctly insert a table on the required Word page.

Learn more about inserting page breaks on Word documents at https://brainly.com/question/1267739

Last week, a disk containing CSM Tech Publishing’s current project manuscripts crashed. Fortunately, there was a backup, but all files that had been added or changed that day were lost. A new disk had to be purchased for overnight delivery, and the data had to be restored. Several days of work were lost. The owner of CSM Tech wants to know what can be done to prevent the loss of data and time if a disk crashes in the future. The server currently has two disks installed: one for the Windows boot and system volumes and one for manuscript files. The disk used for manuscript files is about one-third full. There’s enough money in the budget to purchase up to two new drives if needed. a. What solution do you recommend, and why?

Answers

Answer:

They should go for cloud based model

Explanation:

Cloud based model should be sort after because with such a model there can be a restoration of contents in just a little period of time. As for the usage, payments can be done. They would have highly packed response time, turn around time and also provide information security. At a go, there is flexibility in terms of storage and information retrieval. This may be more costly though but it would be helpful for data recovery without requiring physical data transmission

Write a program to construct the first 15 terms of a geometric sequence with initial term 4 and a common ratio 1/2. The output should be a python list and the number should be rounded to 5 digits after the decimal places.

Answers

The program to construct the first 15 terms of a geometric sequence with initial term 4 and a common ratio 1/2 is as follows:

def geometric(a, r):

    list_of_terms = [a]

    length = 0

    n = 2

    while length < 14:

         x = round(a*pow(r, n-1), 5)

         length += 1

         n += 1

         list_of_terms.append(x)

    return list_of_terms

print(geometric(4, 0.5))

Code explanation

The code is written in python.

we defined a function named geometric. The function accept two parameters as a(first term) and r(common ratio).we declared a variable "list_of_terms" and store the first term in it. Then we initialise length to zeroThe number of term start from 2.While the length variable is less than 14, we use the geometric formula to find the terms by increasing the value of n in the loop.We append the terms to list_of_terms.Then return the list_of_terms.Finally, we call the function with the parameters.

learn more on python here: https://brainly.com/question/26949234

From analysis, Arthur believes the system's I/O throughput will improve by changing the I/O scheduler. On his system is a real-time application, which uses a database located on a solid-state drive. Which I/O scheduler should Arthur choose?

Answers

Since the real-time application uses a database that is located on a solid-state drive, Arthur should use a deadline I/O scheduler.

What is an I/O scheduler?

An I/O scheduler is an abbreviation for input-output scheduler and it can be defined as a technique which is used by the operating system (OS) of a computer to decide the particular order that input-output (I/O) operations are submitted to storage volumes such as solid-state drives.

In this scenario, Arthur should use a deadline I/O scheduler because his real-time application uses a database that is located on a solid-state drive.

Read more on data here: brainly.com/question/13179611

Other Questions
20 POINTSPart D How many of the 320 million Americans would you predict wear CORRECTIVE lenses? A fruit punch recipe uses 4 cups of orange juice for every 1 cup of cranberry juice. Select thestatement about the recipe that is truea The ratio of orange to cranberry juice is 4:5.b. The ratio of cranberry to total fruit juice is 1:4.The ratio of cranberry to orange juice is 1:4.d. The ratio of orange to cranberry juice is 1:4. 10 POINTS!!!! Please help. I will mark brainliest!!!!Who was responsible for the Holocaust?A The Slavic peoplesB The CommunistsC The NazisD The Fascists why is shakespeare still considered such a great artist? What are the 3 forms of government discussed in the previous section? Give an example ofeach. Details in the cartoon suggest that ethnic cleansing is an action based on A.) Racist attitudes B.) antiwar movements C.) pro-democracy activities D.) humanitarian intervention help... A boy who is 3 feet tall can cast a shadow on the ground that is 7 feet long. How tall is a man who can cast a shadow that is 14 feet long? A small lizard is 5/1inch long. A larger lizard is 5 1/5 times as long. How long is the larger lizard? How to whiten white clothes that have yellowed without bleach. Nous aimons beaucoup jouer _____ foot et____ balle. A. Au/u laB. Du/de laC. la/ la D. la/ au Help please Im really struggling this is an evolutionary ( also known as phylogenetic) tree. what is the purpose of a phylogenetic tree?A. mapping the evolutionary progress of organisms and where they branch to form new organisms B. tracking every species that has ever lived on earth C. marking where each species lives on earth Jared's little sister asked him to explain how cells are similar in different organisms. Which comparison would best describe the similarities? Why was calligraphy important in Islamic culture?It was used to write short stories.It was used in art instead of images.It was a way to record medical information.It was a way to translate works of literature. Please help me!!!!!!! In Industrial Property is valued at $475,00. The land value is 15% of the total value. Calculate the annual IRS depreciation deduction. (round to the nearest dollar) Relative location , I need some help. this assignment is past due date and I have no idea how to do the other ones! Thank you if you help I will mark you 204% as a fraction? who every now put it in comments An international calling plan charges a rate per minute plus a connection fee. You can make a phone call from France to the United States for $0.22 per minute plus a $0.99 connection fee. Write a linear equation that could be used to represent the cost of an x minute phone call. What does The Age of Enlightenment have to do with Muslims in concentration camps?