Mutual authentication and key establishment protocol

Assignment Help Computer Engineering
Reference no: EM1319271

Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS. During the protocol, trusted Server produces a fresh, random session key K and distributes it to both Alice and Bob as follows:

1) Alice → Bob. A, NA where NA is fresh and random
2) Bob → Server. B, encKBS (A,NA,NB) where NB is fresh and random
3) Server → Alice. encKAS (B,NA,K),encKBS (A,K), NB where K is a fresh session key
4) Alice → Bob. ????

Goal of the protocol is to:

a) Establish a key which is only known to the Alice and Bob

b) Alice and Bob are confident they are talking to each other (not someone else).

i) What message must Alice send to Bob in step 4 of the protocol? Describe why your solution leads to a protocol which has the above two properties.

ii) Suppose these condmessage of the protocol (fromBobtoServer) is changed to B, encKBS(A,NA),NB. In other words, Bobs nonce NB is not encrypted. Is the protocol still secure? Discuss.

iii) Suppose the third message of the protocol (fromServertoAlice) is changed to B, encKAS(NA,K), encKBS(A,K),NB. In other words, Bobs identity B is not encrypted. Is the protocol still secure? Discuss.

Reference no: EM1319271

Questions Cloud

Question related to descriptive statistics : For the following scores, find the: A. Mean. B Median. C. Sum of squared deviation. D. Variance. E. Standard deviation.
Recover compensation for services : Suppose CCP Management, Inc., entered into a property management agreement with Andrew Hoganmuller and several companies which Hoganmuller operated.
Formulate an integer program that maximizes hagger''s profit : Hagger Engineering Corporation is considering undertaking several proposed projects for the next fiscal year.  The projects, the number of engineers and the number of support personnel necessary for each project.
Assumes the perfectly competitive firm : Assumes the perfectly competitive firm is in long-run equilibrium also there is an rise in Demand
Mutual authentication and key establishment protocol : Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS.
Computing the mean of the sampling distribution : Compute the mean of the sampling distribution? Compute the standard deviation of sampling distribution?
Functions of management in polc model : Robbins and Judge (2013) discussed the four functions of management in the POLC model: Planning, Organizing, Leading, and Controlling. Think about a time in your work, personal or school experience where you have held a position that required you ..
Solve the given equations : Solve the given equations
Calculating mean-median-sum of squared deviation : For the following scores, find the (A) mean, (B) median, (C) sum of squared deviations, (D) variance, and (E) standard deviation:

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is oracle administration documentations

What is oracle administration documentations

  About snmp

What do you understand by the term SNMP? Explain the role which SNMP plays in managing the networks.

  Binary hypercube and a barrel shifter

Consider an illiacmesh (8*8) ,a binary hypercube and a barrel shifter, all with the 64 nodes labelled n0,n1…n63.all network links are bidirectional.

  Displaying recent entries of windows security event log

Issue a command which will show 100 most recent entries within the Windows security event log displaying only those entries which were a successful logon event by the Interactive logon.

  Write proper sequence in design of a video rental database

Write proper sequence in design of a video rental database

  Implementing c++ program that simulates a submarine

Design and implement the C++ program which simulates a submarine. If sub tries to leave area or it wanders into the shallow area, the simulation should end. Initialize array to -1. The user should be able to move the sub up, left, right and down.

  Verilog system

Develop a verilog system which utilizes a block code for the error management. The system must accept a 15-word block of 8-bit data words one word at a time.

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  How to explain capacity of the queue

How to explain capacity of the queue

  Hardware support to memory management

Study any two multicore processor architecture and discuss the following features briefly

  Illustrate decryption equation

Illustrate decryption equation.

  Write a program that mimics a flop-turn-river of poker game

Write down a program that mimics a flop-turn-river of a poker game. I must have three buttons titled Deal, Shuffle and Start Over.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd