A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario. One or more of the following security violations can take place. 1) S can launch a birthday attack to replace m with a fraudulent message. 2) A third-party attacker can launch a birthday attack to replace m with a fraudulent message. 3) R can launch a birthday attack to replace m with a fraudulent message. Which of the following are possible security violations?
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario. One or more of the following security violations can take place. 1) S can launch a birthday attack to replace m with a fraudulent message. 2) A third-party attacker can launch a birthday attack to replace m with a fraudulent message. 3) R can launch a birthday attack to replace m with a fraudulent message. Which of the following are possible security violations? Correct Answer 1 only
Concept:
Birthday attack means sending a fraudulent message with the same has value and digitally signed as that of original message.
Two ways are there for using digital signature:
One is, in which whole message will be encrypted first using sender’s private key and then receiver’s public key.
Second is, when only message digest is encrypted using sender’s private key.
Explanation:
Consider all the violations one by one:
1) S can launch a birthday attack to replace m with a fraudulent message. TRUE
In this, S can use some fraudulent message and then encrypt it with its private key and then receiver’s public key.
2) A third-party attacker can launch a birthday attack to replace m with a fraudulent message. FALSE
Third party attacker can’t launch birthday attack, as it doesn’t have sender’s private key and then can’t encrypt the message.
3) R can launch a birthday attack to replace m with a fraudulent message. FALSE
R can’t launch the birthday attack, because it doesn’t have the sender’s (S) private key and thereby can’t encrypt the message.