紧急求助!星期一要交的(Network Security)作业.谢谢帮忙!# EmergingNetworking - 热门网络技术
t*o
1 楼
问了很多人都不会做,这里牛人多,帮我看看吧?谢谢了.
Suppose that someone suggests the following way to confirm that the two of
you are both in possession of the same secret key. You create a random bit
string the length of the key, XOR it with the key, and send the result over
the channel. Your partner XORs the incoming block with they key (which
should be the same as your key) and sends it back. You check and what you
receive is your original random string, you have verified that your partner
has the same secret key, y
Suppose that someone suggests the following way to confirm that the two of
you are both in possession of the same secret key. You create a random bit
string the length of the key, XOR it with the key, and send the result over
the channel. Your partner XORs the incoming block with they key (which
should be the same as your key) and sends it back. You check and what you
receive is your original random string, you have verified that your partner
has the same secret key, y