How to protect communications by eavesdropper

Assignment Help Computer Network Security
Reference no: EM1367971

Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server's public key Ks. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows:

Alice ? Server Ks{KA}
Bob ? Server Ks{K}
Server ? Alice K⊕KA
Alice recovers key K as KA⊕(K⊕KA)

To summarize, Alice sends her secret to the server encrypted with the server's public key, while Bob sends the newly generated key, also encrypted with the server's public key. The server XORs the two values together and sends the result to Alice. As a result, both Alice and Bob know K.
Suppose that evil Charlie eavesdropped on Bob's message to the server. How can he with the help of his equally evil buddy Don, extract the key K that Alice and Bob are using to protect their communications? Assume that Charlie and Don can engage in the TMN protocol with the server, but they do not know the server's private key.

Reference no: EM1367971

Questions Cloud

Explain what value do statistics add to decision making : What value do statistics add to decision making and what limitations are there when applying statistics to decision making?
Explain the meaning of efficient markets : Describe the meaning of efficient markets. Why might we expect markets to be efficient most of the time?
Illustrate what is worth analysis : Illustrate what is worth analysis and Illustrate what things and conditions are to be kept when doing worth analysis of products and or construction work. Illustrate what are advantages of utilizing yearly worth analysis.
Employment opportunities in community health nursing : Most of the employment opportunities in community health nursing need a BSN. What features of the community health nursing role appeal to you?
How to protect communications by eavesdropper : Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?
What type of fiscal policies would help move economy back : Illustrate what kind of gap-inflationary or recessionary-will economy face after shock and illustrate what type of fiscal policies would help move economy back to potential output.
Long-run total cost-long-run average cost : The production engineers at Impact Industries have derived the optimal combinations of labor and capital (the only two inputs used by Impact) for three levels of output: 120, 180, and 240 units of output:
Calculate the cash conversion cycle and operating cycle : A Company issues $1,000,000 of commercial paper with a maturity of 60 days and a discount rate of 5%. The paper is sold through a dealer who charges 0.25 percent.
Positive interpretation of cynical behavior : Here is a rather positive interpretation of cynical behavior. I always view cynicism as negative until I read this. Do you think that this quote rings true about us, our colleagues, our staff?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Use of keys to communicate when alan sends private message

Alan and Beatrice are both users of (PKI)also called public key infrastructure. Describe how they use their keys to communicate when Alan sends a private message to Beatrice

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Finding decryption function and recovered plaintext

If you receive the ciphertext message YPHDCRPBEQTAA, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Discretionary and mandatory access control

Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd