How to protect communications by eavesdropper

Assignment Help Computer Network Security
Reference no: EM1367971

Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server's public key Ks. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows:

Alice ? Server Ks{KA}
Bob ? Server Ks{K}
Server ? Alice K⊕KA
Alice recovers key K as KA⊕(K⊕KA)

To summarize, Alice sends her secret to the server encrypted with the server's public key, while Bob sends the newly generated key, also encrypted with the server's public key. The server XORs the two values together and sends the result to Alice. As a result, both Alice and Bob know K.
Suppose that evil Charlie eavesdropped on Bob's message to the server. How can he with the help of his equally evil buddy Don, extract the key K that Alice and Bob are using to protect their communications? Assume that Charlie and Don can engage in the TMN protocol with the server, but they do not know the server's private key.

Reference no: EM1367971

Questions Cloud

Explain what value do statistics add to decision making : What value do statistics add to decision making and what limitations are there when applying statistics to decision making?
Explain the meaning of efficient markets : Describe the meaning of efficient markets. Why might we expect markets to be efficient most of the time?
Illustrate what is worth analysis : Illustrate what is worth analysis and Illustrate what things and conditions are to be kept when doing worth analysis of products and or construction work. Illustrate what are advantages of utilizing yearly worth analysis.
Employment opportunities in community health nursing : Most of the employment opportunities in community health nursing need a BSN. What features of the community health nursing role appeal to you?
How to protect communications by eavesdropper : Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?
What type of fiscal policies would help move economy back : Illustrate what kind of gap-inflationary or recessionary-will economy face after shock and illustrate what type of fiscal policies would help move economy back to potential output.
Long-run total cost-long-run average cost : The production engineers at Impact Industries have derived the optimal combinations of labor and capital (the only two inputs used by Impact) for three levels of output: 120, 180, and 240 units of output:
Calculate the cash conversion cycle and operating cycle : A Company issues $1,000,000 of commercial paper with a maturity of 60 days and a discount rate of 5%. The paper is sold through a dealer who charges 0.25 percent.
Positive interpretation of cynical behavior : Here is a rather positive interpretation of cynical behavior. I always view cynicism as negative until I read this. Do you think that this quote rings true about us, our colleagues, our staff?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  C program encryption-decryption system using caesar cipher

Program "Encryption/Decryption"system only the code by using C programming work with PUTTY use Caesar cipher.

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Computing the value of shared secret key

You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Attacking the devises by doing buffer overflow

Implement buffer overflow in c++ And attacking the devises by doing buffer overflow.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd