Menu

[Solved]Authentication Protocol Wireless Network Computer Prove Possession Secret Information Acce Q37166757

An authentication protocol for a wireless network is for acomputer to prove the possession of some secret
information to an access point (e.g., a wireless router), beforethe computer can be allowed to connect to the
wireless network. Consider the following protocol.
Assume that the access point and the client share a secret keyk.
Access is granted to the client only if it passes a challenge-basedauthentication: (i) a challenge text is
sent to the client in the clear, (ii) the client encrypts thechallenge text with the secret key k and returns the
ciphertext, and (iii) the ciphertext is decrypted by the accesspoint with the secret key k and verified.
1. Is the above protocol vulnerable to attacks that target thesecrecy of the shared key k, e.g., off-line
dictionary attack? Please justify your answer.
2. To improve the security of shared-key authentication, oneapproach is to modify the challenge-response
procedure. Can you think of a solution that borrows concepts ofSSL? Hint: suppose the access point
has a public-key certificate.

Expert Answer


Answer to An authentication protocol for a wireless network is for a computer to prove the possession of some secret information t… . . .

OR


Leave a Reply

Your email address will not be published. Required fields are marked *