CSCI468 Advanced Network Security Assignment

Assignment Help Other Subject
Reference no: EM132499486

CSCI468 Advanced Network Security - University of Wollongong

Problem 1
Prove that the GQ Identification Scheme given in the lecture notes (Identification Scheme I, slides 27 - 28) is secure against passive attacks under the hardness of the RSA problem described below.

RSA Problem: given an RSA public key pk = (e ,N) and a random element Y in Z*N, find X in Z*N such that Y = Xe mod N.

Hint: you can take the proof strategy for the Schnorr Identification Scheme as a reference.

Problem 2
Multi-factor user identification requires a user to possess multiple factors, such as a knowledge factor ("something the user knows"), a possession factor ("something the user has"), and an inherence factor ("something the user is"), in order to identify him/herself to a verifier. A commonly used two-factor user identification mechanism is based on smart-card (something the user has) and password (something the user knows). Such a mechanism should ensure that an adversary cannot pass the identification even if the adversary has obtained one of the identification factors (i.e., the attacker either obtains the information in the smart-card or the user password). Consider the following two-factor identification protocol:

User Setup.

Let x denote a 128-bit secret key of a remote web server, and h(•) a secure cryptographic hash function. Each legitimate client C with identity IDC shares a 6-digit password PW with the server. In addition, C has a smart-card issued by the server, which has the information (IDC, B, p, g) stored in the Read Only Memory (ROM) of the card, where B = h(PW)⊕h(x, IDC), p is a large prime number, and g is a generator of Zp*.
User Login.

Step 1: In order to login the server, the client first attaches the smart-card to a card reader which is connected to a computer, and then types in the password PW. The computer retrieves the values of (IDC, B, p, g) from the smart-card via the card reader, and computes Z

= B⊕h(PW). After that, the computer chooses a random number u ∈ Zp-1, computes NC = gu mod p, and sends a login request (IDC, NC) to the remote server.

Step 2: Upon receiving the request, the web server first checks if IDC belongs to a legitimate client. If the server cannot find IDC in its database, then the request is rejected. Otherwise, the server chooses a random number v ∈ Zp-1, computes NS = gv mod p, K = NCv mod p, Z' = h(x, IDC), and TS = h(Z', NC, NS, K). The server then sends (NS, TS) to the client.

Step 3: After receiving (NS, TS) from the server, the client's computer computes K' = NSu mod p, TS' = h(Z, NC, NS, K') and verifies if TS' = TS. If the equation holds, the client's computer generates TC = h(Z, NS, NC, K'), and sends TC to the web server.

Step 4: The web server computes TC' = h(Z', NS, NC, K) and verifies if TC' = TC. If the equation holds, then the client is identified successfully; otherwise, the client identification fails. If the client has three consecutive identification failures, then the client's account will be locked by the web server, and the client needs to contact the Administrator in order to unlock the account.

Answer the following questions:

(a) Perform a security analysis for the above protocol against a passive attacker.
(b) Perform a security analysis for the above protocol against an active attacker.

Hint: consider the situation that the attacker has obtained one of the identification factors.

Problem 3

Consider the following key exchange protocol which is a variant of the Diffie-Hellman protocol. Each user P has a private key xP and public key gxP mod p where p is a large prime number and g is a generator of a subgroup with a large prime order q (i.e., the small subgroup attack doesn't work).

1: A → B: grA mod p

2: B → A: grB mod p
Shared Key K = grAxB + grBxA mod p. In the protocol, rA and rB are randomly chosen in each session.
a) Show the key derivation formulas of User A and User B (i.e., how does each user compute the shared key?)
b) Does the man-in-the-middle attack against the textbook Diffie-Hellman protocol work against the above protocol? Justify your answer.
c) Show that this protocol is insecure in the CK model (i.e., describe an adversary A that can win the security game with a non-negligible advantage over random guess).

Problem 4
Consider the following Password-based Key Exchange protocol where A and B share a common password P. In the protocol, EP() denotes a secure symmetric key encryption algorithm using P as the encryption/decryption key; EncPK() denotes a secure public key encryption algorithm using PK as the encryption key. The public key PK and the corresponding secret key SK are owned by A. K is a random session key chosen by B in each session and doubly encrypted using EncPK() and EP().

1. A → B: Ep(PK)

2. B → A: Ep(Encpk(K)

output: K ( Session Key)

(a) Is the protocol secure if PK is publicly known by everyone? Justify your answer.
(b) Is the protocol secure if PK is freshly generated by A in each session? Justify your answer.

Problem 5
Alice and Bob are employees residing in two dispersed branches, D1 and D2, of the same company. They want to secure all the communications between them as follows:

i) they want to ensure the authenticity of their IP packets when those packets are routed in the company intranet (i.e., Alice can verify a packet is indeed from Bob, and vice versa);

ii) they want to ensure confidentiality of their IP packets (including IP addresses) when those packets are routed in the external network between D1 and D2. Design a security solution for the above scenario. Describe the format of an IP packet when it is delivered at different sections of the network.

Reference no: EM132499486

Questions Cloud

Prepare adjusting entries needed for the accrual of interest : For ease of computation assume that Inc. calculates interest expense based on the number of months, outstanding, rather than the number of days.
Effective ways to reduce bullying in schools : Effective Ways to Reduce Bullying in Schools For this Assignment, you will prepare an outline for your Unit 9 Assignment similar to the sample outlines
Write a reflective review of the production : After watching the recording of The Complete Works of William Shakespeare (Abridged) write a reflective review of the production. Your review should include.
What should be the total value of the two items of inventory : What should be the total value of these two items of inventory in the statement of financial position? Neshila Ltd has only 2 items of inventory at reporting
CSCI468 Advanced Network Security Assignment : CSCI468 Advanced Network Security Assignment help and solution, University of Wollongong - assessment writing service - Perform a security analysis
Show the relevant extracts from the final accounts : Show the relevant extracts from the 31/12/15 final accounts. KUC PLC revalues its buildings and decides to incorporate the revaluation into the books of account
What is the 6-month forward exchange rate : If interest rate parity holds, what is the 6-month forward exchange rate? Do not round intermediate calculations. Round your answer to five decimal places.
How people talk and interact with each other : Many playwrights take inspiration for their plays from the world around them. Then they take that inspiration and transform it into the world of the play.
Show how the matter will be disclosed in ppe note : Show how this matter will be disclosed in PPE note for the year ended 31 December 2019. Machine is the only asset of the entity.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd