Question

In: Computer Science

Recall that even if the server only stores f(p), client has to send p in clear...

Recall that even if the server only stores f(p), client has to send p in clear to authenticate to the server. If the adversary is watching, it learns p. Normally you have to use HTTPS to solve this problem. Alice has another idea. Instead of client sending p, client will instead only send f(p) to the server to authenticate. Then the adversary never learns p even if it can watch the whole communication. Is this a good idea?

Solutions

Expert Solution

The authentication system have to be very secured these days as the chances for getting attacked is very high. We should use high end mechanism to encrypt the authenticating proess. It is must to use a HTTPS protocol for authentication to protect maximum. The idea of Alice may work but still not safe.

If f(p) is send to the server, server have to generate p from f(p). This will make the system complex. There should be a decrypting mechanism in the server side to generate p from f(p). This mechanism can be fetched and used by an attacker so that the attacker can now generate p from f(p) and authenticate to the system.

Today, attackers are even capable of finding the private key from the public key. That level of decrypting system are using by them. So sending f(p) directly without the HTTPS protocol is much risking. HTTPS itself provide adequate protection for the transmission. Using HTTPS and sending f(p) instead of sending p would be recommended for maximum security.


Related Solutions

Suppose a TCP client needs to send 3 packets to the TCP server. Before sending the...
Suppose a TCP client needs to send 3 packets to the TCP server. Before sending the first packet, the estimated RTT is 50 ms, and the estimated deviation of the sample RTT is 10 ms. The parameters α= 0.1, and β = 0.2. The measured sample RTT for the three packets are 60ms, 70 ms, and 40 ms, respectively. Please compute the time out value that was set for each packet right after it is being transmitted out.
A email application is an instance of a client-server model of computer networking. T/F Which of...
A email application is an instance of a client-server model of computer networking. T/F Which of the following command is used to list out process details in Unix system. mkdir process_a ls -;a bg ps -l -u $(whoami) Which of the file is used to sink the output of a process to Null. /dev/null /dev/tty /dev /dev/empty What does a pipe operator do? performs an OR operation takes input form a file and fees as input to other command it...
How do I make a simple TCP python web client and web server using only "import...
How do I make a simple TCP python web client and web server using only "import socket"? Basically, the client connects to the server, and sends a HTTP GET request for a specific file (like a text file, HTML page, jpeg, png etc), the server checks for the file and sends a copy of the data to the client along with the response headers (like 404 if not found, or 200 if okay etc). The process would be: You first...
Fenway Market has two stores, F and G. During February, Store F had a segment margin...
Fenway Market has two stores, F and G. During February, Store F had a segment margin of $10,000, traceable fixed expenses of $26,000, and variable expenses equal to 55% of sales. Fenway Market as a whole had a combined segment margin of 15%, a contribution margin ratio of 40%, and total sales of $180,000. Based on this information, the traceable fixed expenses in Store G were: Show process thanks.
Your firm has just landed a large client contract in Germany and secured an even larger...
Your firm has just landed a large client contract in Germany and secured an even larger supplier contract from Mexico. You are in the automobile stereo sound system business with the Detroit Auto Show, your signature event (product, advertising, etc.), and a potential deal with the Chinese and Brazilians projected to be signed and sourced in March and July 2016, respectively. What do you recommend your C-Suite consider and your risk management group do, if anything, about this increasingly international...
A distribution f(x) describes a population of squirrels. The function is only meaningful when it has...
A distribution f(x) describes a population of squirrels. The function is only meaningful when it has positive values, and is given as f(x) = {-3(x-5)2+3*5*5} What percentage of the squirrels exist between x=0 and x=5/4? Formatting note, if 1/2 of the squirrels are in this portion of the distribution, your answer should be 50.
Your client chooses to invest 40% in your portfolio (p) and 60% (f) in the risk-free asset. What is the standard deviation of your client’s portfolio?
You are a manager of a risky portfolio (consists of bonds and stocks) with an expected return E(rp) = 8% and standard deviation stdevp = 12%. The risk free rate rf = 2% and the standard deviation of the risk free asset is stdevf = 0% 7. Your client chooses to invest 40% in your portfolio (p) and 60% (f) in the risk-free asset. What is the expected return?1. Your client chooses to invest 40% in your portfolio (p) and...
prove that f(x)=x^2019 +x-1 has only one real root
prove that f(x)=x^2019 +x-1 has only one real root
It has been estimated that only about 40% (p = 0.4) of California residents have adequate...
It has been estimated that only about 40% (p = 0.4) of California residents have adequate earthquake supplies. Suppose you randomly survey 50 California residents. We are interested in the number who have adequate earthquake supplies. What is the probability that exactly 30 residents will have the needed supplies?
Suppose that a firm has the p production function f(x1; x2) = sqrt(x1) + x2^2. (a)...
Suppose that a firm has the p production function f(x1; x2) = sqrt(x1) + x2^2. (a) The marginal product of factor 1 (increases, decreases, stays constant) ------------ as the amount of factor 1 increases. The marginal product of factor 2 (increases, decreases, stays constant) ----------- as the amount of factor 2 increases. (b) This production function does not satisfy the definition of increasing returns to scale, constant returns to scale, or decreasing returns to scale. How can this be? (c)Find...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT