Establish a secure communication channel

Assignment Help Computer Network Security
Reference no: EM131018344

I need solution of this problem and code in the suggested files in Assignment description

Advanced Network Security

Assignment

Objectives

On completion of this assignment you should be able to:

- Understand some basic techniques for building a secure channel.
- Understand network programming.

Write (Java or C/C++) UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.

Alice and Bob share a common password PW which contains 8 alphanumeric characters. They want to establish a secure communication channel that can provide data confidentiality and integrity. They aim to achieve this goal via the following steps: (1) use the password to establish a shared session key; (2) use the shared key to secure the communication.

Step 1 is done via the following key exchange protocol:

1: A → B: EPW(KA)
2: B → A: EPW (KB)

Alice and Bob then compute the shared key as K = Hash(KA||KB). KA and KB are both 128-bit random binary strings, and || denotes string concatenation. Alice and Bob decide to use AES as the encryption function, and MD5 as the Hash function.

After establishing the session key, step 2 is achieved as follows:

1. whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob.

2. upon receiving a ciphertext C, Bob first runs the decryption algorithm to obtain M||H = DK(C). After that, Bob computes H' = Hash(K||M) and checks if H = H'. If the equation holds, then Bob accepts M; otherwise, Bob rejects the ciphertext.

3. the same operations are performed when Bob sends a message to Alice.

Implementation guidelines

- Place Host and Client in two separate directories: Alice and Bob. The shared password is located in a file under each directory.

- Alice executes Host.

- Host is running and listening to the opened port (you need to select a port for your code).

- Bob executes Client.

- Client (Bob) sends a connection request to Host.

- Client is ready and listens to the port.

- Host generates a random KA, encrypts it using AES, and sends the ciphertext to Client.

- Upon receiving the message from the Host, Client decrypts the message to obtain KA, randomly chooses KB, encrypts it and sends the ciphertext to Host. Client then computes the shared key K based on KA and KB.

- Upon receiving the message from Client, Host performs the decryption to obtain KB and then computes the shared key K.

- Now, the secure channel is established.

- Either Alice or Bob can send a message encrypted and authenticated by the key K. They type the message on their own terminal. The message is processed by their code (Host or Client) according to the step 2 description given above.

- The received message is printed on the screen if decryption is successful. Otherwise, print "decryption error" on the screen.

- To quit the program, the client should type "exit".

Coding requirement:

You need to write two programs: Host and Client. You should name your programs: host.cpp or host.java and client.cpp or client.java.

You can choose to use some existing libraries or free source code to implement AES and MD5. You should cite the source if you use a downloaded code. Important: make sure your programs can be complied and executed in banshee (banshee.uow.edu.au).

How to run?

Your programs should run according to the protocol. Host and Client should be executed on different windows. For convenience of marking, please use the local IP: 127.0.0.1 for the submitted version. For simplicity, there is no GUI required in this assignment. That is, messages are simply typed on the window and printed on the receiver's window. The looping should continue until the moment the user types "exit" to exit.

Reference no: EM131018344

Questions Cloud

Write an equation for joe production possibility frontier : Suppose Joe has sixty hours of labor available to produce windows and doors. Write an equation for Joe's production possibility frontier for these two goods based on the above information. Write this equation in slope intercept form and measure wi..
Write udp programs to establish communication channel : Write UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.
What should the organization do with regard to marketing : What can you tell about their business health? What should this organization do with regard to marketing? This is where all those years of education start to pay off.
Describe the appearance of red blood cells : 1. Describe the appearance of red blood cells (RBCs), white blood cells (WBCs),and platelets.2. Describe the function of RBCs, WBCs, and platelets.
Establish a secure communication channel : Understand some basic techniques for building a secure channel - Understand network programming and Write UDP programs allowing two parties to establish a secure communication channel.
Why is business ethics such an important topic : What makes the accounting profession different to the point that professional ethics becomes a defining characteristic?
Stanley developed diplopia : Following a car accident in which he hit the left side of his head on the car door, Stanley developed diplopia (double vision) and was unable to move his left eye laterally (abduct the left eye). Explain how this injury caused Stanley's symptoms
What is the internal rate of return on this new plant : Microwave Oven Programming, Inc is considering the construction of a new plant. The plant will have an initial cash outlay of $7.6 million (= -$7.6 million), and will produce cash flows of $3.7 million at the end of year 1, $4.1 million at the end of..
Identify three major themes that are distinct to the church : Identify three major themes that are distinct to the church figure, or for which he/she is widely known. For example, if writing on Martin Luther (who is a major figure and not an option for this assignment)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identifying and discussing technological improvements

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

  Mitigate risk by using information security systems policies

Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies

  Future threats to network security - research paper

Deliver a research paper and presentation based on your research - Future threats to network security and planning for those threats

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Description of the kerberos authentication protocol

Give your general description of the Kerberos authentication protocol and explain the term: Authenticator used in the Kerberos authentication protocol.

  Why do you think functional silos are not appropriate for

1. where are erp systems heading in the future? do you agree or disagree with the trends discussed in the chapter?

  Sensor network using xmpp based communication

Write a research paper on Security Mechanism for Sensor Network Using XMPP Based Communication

  Describe the frame format of a typical ethernet packet.

Explain how carrier sense multiple access with collision detection (CSMA/CD) works.

  Monitoring of a secure network design in an organization

Analyze strategies for maintenance and monitoring of a secure network design in an organization. Create recommendations for maintenance and monitoring tools to support maintenance of a secure network within an organization

  Research on the internet what is health data stewardship

research on the internet what is health data stewardship? why does it matter in the discussion of a national health

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd