For the protocol in section 173 how might an attacker be


1. For the protocol in Section 17.3, what is a reasonable lifetime to use for the keys KA? Why? What bad things could happen if the lifetime is longer? What bad things could happen if the lifetime is shorter?

2. For the protocol in Section 173, how might an attacker be able to learn KA before it times out? What bad things would the attacker be able to do with that knowledge? What bad things would the attacker not be able to do with that knowledge?

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: For the protocol in section 173 how might an attacker be
Reference No:- TGS01665279

Expected delivery within 24 Hours