B) Assume the following scenario is used in X organization that allows Yousef to verify (authenticate) Dana. (2 Points)
Yousef and Dana have the same secret key (bit string, for example 11001011). The secret key is exchanged manually between them.
The system is working as follows:
When Yousef wants to send a message to Dana:
Yousef writes the message as a bit string (01110110), the length of the message must be equal to the length of the key.
The system XORs the message with the key and sends the output (Output 1) to Dana.
When Dana receives the message:
The system XORs the incoming message with the secret key (Output 2).
Dana sends output 2 to Yousef.
Yousef checks, and if what he receives is the same as the original message (01110110), he has verified that Dana has the same secret key.
As an ethical hacker, is the above scenario flawed? Answer: (Yes/No)
Can the hacker obtain the secret key? Explain your answer by example.