✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Bob connects to a public Wi-Fi at a coffee shop and uses a website that claims to support end-to-end encrypted messaging using Diffie-Hellman key exchange. However, an attacker sitting nearby is able to intercept and read Bob’s messages. Later, Bob realizes that his device never received a security warning.
Which of the following is the most likely
a) The attacker modified Bob’s public key and inserted their own during the key exchange. b) Bob’s device cached an older session key, allowing replay attacks. c) The attacker performed a chosen-ciphertext attack on the encrypted messages. d) The key exchange used a prime number that was too small, making it easy to compute discrete logarithms.
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!