Suppose we are using lamports hash and bobs system crashes


1.Suppose we are using Lamport's hash, and Bob's system crashes before receiving Alice's reply to a message. Further suppose an intruder, Trudy, can eavesdrop and detect that Bob crashed (maybe Trudy can even cause Bob to crash).

This would create a situation where Trudy has Alice's reply (which Bob did not receive) and which Trudy can use to impersonate Alice, assuming Trudy logs in before Alice attempts to log into Bob again. How can we modify Bob's behaviour to prevent this threat, and exactly when would we overwrite Bob's database, and with what?

Solution Preview :

Prepared by a verified Expert
Operating System: Suppose we are using lamports hash and bobs system crashes
Reference No:- TGS01252382

Now Priced at $20 (50% Discount)

Recommended (90%)

Rated (4.3/5)