HOTSPOT Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent between Alice and Bob as shown in the following image:

August 27, 2021 by Admin

HOTSPOT

Alice and Bob are exchanging messages with each other. Chuck modifies the messages sent between Alice and Bob as shown in the following image:

98-367 Part 05 Q18 030

98-367 Part 05 Q18 030

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

98-367 Part 05 Q18 031 Question

98-367 Part 05 Q18 031 Question

98-367 Part 05 Q18 031 Answer

98-367 Part 05 Q18 031 Answer

Explanation:
The usual way to prevent the man-in-the-middle attack is to use a public key cryptosystem capable of providing digital signatures. For set up, the parties must know each others public keys in advance. After the shared secret has been generated, the parties send digital signatures of it to each other. The man-in-the-middle can attempt to forge these signatures, but fails because he cannot fake the signatures.

Leave a Reply