Having distinctive key KA, KB and KC between Alice, Bob, and Carol is as unsecure as the past one in light of the fact that if Alice needs to make an impression on Bob, he needs to impart his mystery key KA for Bob to unscramble the message sent by Alice. Presently this is a security opening in light of the fact that Bob can mimic Alice to Carol.
The same can be said for Carol and Bob. In case Carol knows Alice's key KA she can emulate Alice to Bob and Bob can copy Carol to Alice.
Answer 2
This protocol is not defenseless to reflection assault that is brought about by streamlining the aforementioned convention. What Trudy can do is, listen stealthily on the messages sent by Alice to Bob, and later Trudy can do the disconnected from the net secret key …show more content…
Answer 6
Steps to empower and utilization EFS
1. We must have the NTFS authorization to change the record or envelope.
2. Peruse to the envelope/record which you need to encode.
3. Open record/envelope properties and click general tab and after that select propelled choice.
4. select Encrypt substance to secure information choice. This step will encode the chose record/envelope.
5. When the record/envelope is encoded, it requests that you apply these progressions whether to the whole organizer, to the sub-envelope, or to simply a document in the organizer.
6. To encode the complete envelope and its file's, select apply to the organizer and its file's.
7. To encode the sub-envelope, select the sub-organizer alternative.
8. To encode the file's, select scramble the document just.
9. Select alright, to apply encryption to the chose envelope/record/sub-organizer.
EFS Advantages
1.It is not difficult to get to and totally imperceptible to the