Mutual authentication and key establishment protocol

Assignment Help Computer Engineering
Reference no: EM1319271

Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS. During the protocol, trusted Server produces a fresh, random session key K and distributes it to both Alice and Bob as follows:

1) Alice → Bob. A, NA where NA is fresh and random
2) Bob → Server. B, encKBS (A,NA,NB) where NB is fresh and random
3) Server → Alice. encKAS (B,NA,K),encKBS (A,K), NB where K is a fresh session key
4) Alice → Bob. ????

Goal of the protocol is to:

a) Establish a key which is only known to the Alice and Bob

b) Alice and Bob are confident they are talking to each other (not someone else).

i) What message must Alice send to Bob in step 4 of the protocol? Describe why your solution leads to a protocol which has the above two properties.

ii) Suppose these condmessage of the protocol (fromBobtoServer) is changed to B, encKBS(A,NA),NB. In other words, Bobs nonce NB is not encrypted. Is the protocol still secure? Discuss.

iii) Suppose the third message of the protocol (fromServertoAlice) is changed to B, encKAS(NA,K), encKBS(A,K),NB. In other words, Bobs identity B is not encrypted. Is the protocol still secure? Discuss.

Reference no: EM1319271

Questions Cloud

Question related to descriptive statistics : For the following scores, find the: A. Mean. B Median. C. Sum of squared deviation. D. Variance. E. Standard deviation.
Recover compensation for services : Suppose CCP Management, Inc., entered into a property management agreement with Andrew Hoganmuller and several companies which Hoganmuller operated.
Formulate an integer program that maximizes hagger''s profit : Hagger Engineering Corporation is considering undertaking several proposed projects for the next fiscal year.  The projects, the number of engineers and the number of support personnel necessary for each project.
Assumes the perfectly competitive firm : Assumes the perfectly competitive firm is in long-run equilibrium also there is an rise in Demand
Mutual authentication and key establishment protocol : Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS.
Computing the mean of the sampling distribution : Compute the mean of the sampling distribution? Compute the standard deviation of sampling distribution?
Functions of management in polc model : Robbins and Judge (2013) discussed the four functions of management in the POLC model: Planning, Organizing, Leading, and Controlling. Think about a time in your work, personal or school experience where you have held a position that required you ..
Solve the given equations : Solve the given equations
Calculating mean-median-sum of squared deviation : For the following scores, find the (A) mean, (B) median, (C) sum of squared deviations, (D) variance, and (E) standard deviation:

Reviews

Write a Review

Computer Engineering Questions & Answers

  Powerpoint 2010

Which among the following statement is TRUE regarding the PowerPoint 2010? Provide the answer providing the reson:Any PowerPoint presentation is saved with a .ptt extension after filename.

  Write a program that mimics a flop-turn-river of poker game

Write down a program that mimics a flop-turn-river of a poker game. I must have three buttons titled Deal, Shuffle and Start Over.

  Why array names are not assignable variables in c

Why  array names are not assignable variables in c

  Distributed database

A distributed database is also termed as the Replicated Virtualized Rendered Concatenated database.

  Find minimal cover and identify all possible candidate keys

Find minimal cover and identify all possible candidate keys - Functional Dependencies

  Threats resolved by redhat linux

The switches have the VLANs defined, one for the offices, one for the MIS, and one for the warehouse. Recognize what threats are resolved by the Redhat linux.

  Factors affecting the group process and outcome

In class, we introduced different factors which may affect group process and outcome, like group size and the status effect.

  Program to find smaller between num1 and num2 to output

Program to find smaller between num1 and num2 to output

  Generating a class known as point

Generate a class known as Point which has following private members: Float x - x-coordinate of point,,Float y - y-coordinate of point.

  Determining occurance as incident or disaster

Categorize the following occurrences as an incident or disaster. If an occurrence is a disaster, find whether or not business continuity plans would be called into play.

  How to illustrate a memory map for a system

Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

  Developing an eer schema for database application

Develop an EER schema for a database application which you are interested in. State all the constraints which should hold on the database.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd