Write udp programs to establish communication channel

Assignment Help Computer Network Security
Reference no: EM131018347

Assignment

Objectives

On completion of this assignment you should be able to:

- Understand some basic techniques for building a secure channel.
- Understand network programming.

Write (Java or C/C++) UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.

Alice and Bob share a common password PW which contains 8 alphanumeric characters. They want to establish a secure communication channel that can provide data confidentiality and integrity. They aim to achieve this goal via the following steps: (1) use the password to establish a shared session key; (2) use the shared key to secure the communication.

Step 1 is done via the following key exchange protocol:

1: A → B: EPW(KA)
2: B → A: EPW (KB)

Alice and Bob then compute the shared key as K = Hash(KA||KB). KA and KB are both 128-bit random binary strings, and || denotes string concatenation. Alice and Bob decide to use AES as the encryption function, and MD5 as the Hash function.

After establishing the session key, step 2 is achieved as follows:

1. whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob.

2. upon receiving a ciphertext C, Bob first runs the decryption algorithm to obtain M||H = DK(C). After that, Bob computes H' = Hash(K||M) and checks if H = H'. If the equation holds, then Bob accepts M; otherwise, Bob rejects the ciphertext.

3. the same operations are performed when Bob sends a message to Alice.

Implementation guidelines

- Place Host and Client in two separate directories: Alice and Bob. The shared password is located in a file under each directory.

- Alice executes Host.

- Host is running and listening to the opened port (you need to select a port for your code).

- Bob executes Client.

- Client (Bob) sends a connection request to Host.

- Client is ready and listens to the port.

- Host generates a random KA, encrypts it using AES, and sends the ciphertext to Client.

- Upon receiving the message from the Host, Client decrypts the message to obtain KA, randomly chooses KB, encrypts it and sends the ciphertext to Host. Client then computes the shared key K based on KA and KB.

- Upon receiving the message from Client, Host performs the decryption to obtain KB and then computes the shared key K.

- Now, the secure channel is established.

- Either Alice or Bob can send a message encrypted and authenticated by the key K. They type the message on their own terminal. The message is processed by their code (Host or Client) according to the step 2 description given above.

- The received message is printed on the screen if decryption is successful. Otherwise, print "decryption error" on the screen.

- To quit the program, the client should type "exit".

Coding requirement:

You need to write two programs: Host and Client. You should name your programs: host.cpp or host.java and client.cpp or client.java.

You can choose to use some existing libraries or free source code to implement AES and MD5. You should cite the source if you use a downloaded code. Important: make sure your programs can be complied and executed in banshee (banshee.uow.edu.au).

How to run?

Your programs should run according to the protocol. Host and Client should be executed on different windows. For convenience of marking, please use the local IP: 127.0.0.1 for the submitted version. For simplicity, there is no GUI required in this assignment. That is, messages are simply typed on the window and printed on the receiver's window. The looping should continue until the moment the user types "exit" to exit.

Reference no: EM131018347

Questions Cloud

Explain how zappos has implemented social : Explain how zappos has implemented social responsibility programs into its business
Compare a public network to a private network : Explain the various privacy rights that businesses on the Web are lawfully obligated to adhere to. Describe some of the gray areas in enforcing these laws on the Internet.
What are the advantages and disadvantages of bpm : What are the advantages and disadvantages of BPM? How do "value chain" principles apply to BPR and BPM? Why should an IT manager know the differences between the concepts?
Write an equation for joe production possibility frontier : Suppose Joe has sixty hours of labor available to produce windows and doors. Write an equation for Joe's production possibility frontier for these two goods based on the above information. Write this equation in slope intercept form and measure wi..
Write udp programs to establish communication channel : Write UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.
What should the organization do with regard to marketing : What can you tell about their business health? What should this organization do with regard to marketing? This is where all those years of education start to pay off.
Describe the appearance of red blood cells : 1. Describe the appearance of red blood cells (RBCs), white blood cells (WBCs),and platelets.2. Describe the function of RBCs, WBCs, and platelets.
Establish a secure communication channel : Understand some basic techniques for building a secure channel - Understand network programming and Write UDP programs allowing two parties to establish a secure communication channel.
Why is business ethics such an important topic : What makes the accounting profession different to the point that professional ethics becomes a defining characteristic?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  Why is network security particularly difficult to achieve

Why is network security particularly difficult to achieve?

  Security vulnerabilities of vc

single access point (AP), wireless network, CSMA/CA, goals of information security, Wireless LANs, wireless hacking process, Wired Equivalent Privacy (WEP), Open System Authentication and Shared Key Authentication, Initialisation Vector (IV), RADIU..

  Define attack methodology and countermeasures

Attack Methodology and Countermeasures, Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings.

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Understanding of cryptography and its role to n/w security

Critical views on the advantages and disadvantages of technical solutions to security.

  Write one page about e-id verification topic

Write one page about E-Id verification topic - IEEE Spectrum IEEE Communications Magazine IEEE Network Magazine IEEE Personal Communications Magazine Communications of the ACM Sources.

  Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risks once their dilemma is resolved?

  Develop a detailed capstone project proposal and plan

Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), ..

  Computer ethics

CHECK OUT COMPUTER ETHICS INSTITUTE'S ADVICE. The Computer Ethics Institutes Web site at www.cpsr.org/program/ethics/cei.html offers the "Ten Commandments of Computer Ethics" to guide you in the general direction of ethical computer use.

  Performance measurement guide to information security

Performance Measurement Guide to Information Security. Using this document, identify five measures you would be interested in finding the results from based on your home computing systems and/or network.

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd