5. Authentication Protocols Flashcards
1
Q
What solves symmetric key distribution problem?
A
Public/private keys
2
Q
How to prevent Eve from creating a pair of keys pretending to be Bob?
A
Public key infrastructure
1. Web of trust
2. Trusted authority
3
Q
What’s the hiding property?
A
During commit phase, receiver knows nothing about x
4
Q
What’s the binding property?
A
Sender can’t change x after committing to it.
5
Q
The binding property protects the sender.
A
False, protects the receiver
6
Q
What can prevent a replay attack?
A
Nonce