A new system was installed at the front gate of a secret organization. When a worker wishes to open the gate, they use an Android application that encrypts the command "Open" using AES with a shared symmetric key K1
The encrypted command (ciphertext) is then sent to the server. What is the problem with this algorithm?
A new system was installed at the front gate of a secret organization. When a worker wishes to open the gate, they use an Android application that encrypts the command "Open" using AES with a shared symmetric key K1
The encrypted command (ciphertext) is then sent to the server. What is the problem with this algorithm?
* השאלה נוספה בתאריך: 15-08-2024