SO-
I have this question in my homework, and I have a lot of ideas about why its not true, but I can't put my finger on it precisely...
Here we assume Alice and Bob have a secret key. Consider these 5 steps:
- Alice sends bob "ID_a" to start authentication
- Bob responds with "R_b" (which I think is a random number or timestamp or other nonce)
- Alice Replies with K_a,b(R_b), which establishes her identity to Bob
- Alice sends "R_a" to Bob
- Bob sends K_a,b(R_a) to Alice, to verify his identity
All makes perfect sense, but the question is "Can steps 3 and 4 be combined?" I see no reason why Alice couldn't encrypt her nonce R_a as well, but I remember hearing in class how things like this were done to prevent replay attacks from an evesdropper. How is this? An attacker wouldn't be able to replay an encrypted version of K_a,b(R_anything) because the R_a or b is chose randomly and unique right? Can steps 3 and 4 be combined?