Computer Sciences > Gate 2017 Set-1 > Network Security
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
(I) S can launch a birthday attack to replace m with a fraudulent message.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(III) R can launch a birthday attack to replace m with a fraudulent message.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(III) R can launch a birthday attack to replace m with a fraudulent message.
Correct : a
Similar Questions
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. Q-R1-R2-R3-H H acts as an HTTP server, and Q connects to H via HTTP an...
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. Q-R1-R2-R3-H H acts as an HTTP server, and Q connects to H via HTTP an...
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3. Q-R1-R2-R3-H H acts as an HTTP server, and Q connects to H via HTTP an...
Total Unique Visitors
Loading......