Due back: April 27, 11:59pm, 2008 (by submission timestamp).
Submission: Electronic submission to ychen@northwestern.edu
Notes: 1. To be done by each group.
2. Please do not give a simple yes/no as results to some of the questions. Briefly explain why and how you obtain that result.
|
Vulnerable to network sniffing |
Vulnerable to dictionary attacks |
Client can change his secret in case of a compromise |
Plaintext passwords |
|
|
|
Plaintext biometrics |
|
N/A |
|
Challenge response with user secret on smartcard |
|
|
Yes |