In response to the security issue where an attacker could intercept and retransmit the same encrypted "Open" command to repeatedly open the gate, the developers modified the system by adding a Message Authentication Code (MAC). Now, the application encrypts the "Open" command using AES with the shared symmetric key K1, and generates a MAC using a second key K2
.The encrypted command (ciphertext) and the MAC are sent to the server together
Does this modification prevent the attacker from using the intercepted ciphertext to open the gate?
In response to the security issue where an attacker could intercept and retransmit the same encrypted "Open" command to repeatedly open the gate, the developers modified the system by adding a Message Authentication Code (MAC). Now, the application encrypts the "Open" command using AES with the shared symmetric key K1, and generates a MAC using a second key K2
.The encrypted command (ciphertext) and the MAC are sent to the server together
Does this modification prevent the attacker from using the intercepted ciphertext to open the gate?
* השאלה נוספה בתאריך: 15-08-2024