What is a reasonable lifetime to use for the keys ka and why

What is a reasonable lifetime to use for the keys ka and why

Computer Science

1. For the protocol in Section 17.3, what is a reasonable lifetime to use for the keys KA? Why? What bad things could happen if the lifetime is longer? What bad things could happen if the lifetime is shorter?

2. For the protocol in Section 173, how might an attacker be able to learn KA before it times out? What bad things would the attacker be able to do with that knowledge? What bad things would the attacker not be able to do with that knowledge?

Order from us and get better grades. We are the service you have been looking for.