How would impact the forward secrecy property

Assignment Help Computer Networking
Reference no: EM133373590

Computer Security

Question 1 Cryptographic Data Objects

B has just received the following message, which represents a cryptographic data object:

{(

{(KPbB)KPrS mod KPbS}K1,

{|(NB, NA, {{({K2}KPbB, NS)}(G1)KPrA mod NA}K1, {|{({G3}(KPbA)KPrS mod KPbS, G2)}K1|}KPrB)|}KPrA

)}KBS

The following explains various terms in this object and some of the abbreviations used:
• {M}K represents the encryption of some message/data M using the key K
• {|M|}K represents the digital signing of some message/data M using the key K
• NX represents a nonce (i.e. a fresh and possibly random number used once only) generated by X
• KpbX represents the public part of the key pair presumably owned by X
• KprX represents the private part of the key pair presumably owned by X
• KAB represents a symmetric key shared between A and B
• K (or K1, K2, K3 etc.) represents some arbitrary key with no assumptions about its scope
• M represents some alphanumeric/textual message with no assumptions
• G1, G2, G3 etc. are prime numbers

which of the following sets of keys, nonces, numbers, and alphanumeric/textual messages "best" represents B's knowledge, after B applies any number of possible cryptographic operations to the object above, and assuming that B already has access to key K1 and the public key of any agent:
a) KBS , G2 , KPrB
b) {(KPbB)KPrS mod KPbS , G2 , KBS , KPrB , {(KPbB)KPrS mod KPbS}K1, NA , NB
c) NA , NB
d) NA , NB , KBS , KPrB
e) {(KPbB)KPrS mod KPbS}K1 , {|(NB, NA, {{({K2}KPbB, NS)}(G1)KPrA mod NA}K1, {|{({G3}(KPbA)KPrS mod KPbS, G2)}K1|}KPrB)|}KPrA , NA , NB , KBS , KPrB , {(KPbB)KPrS mod KPbS
f) G2 , NA , NB , G1 , KBS , KPrB
g) (KPbB)KPrS mod KPbS , NA , NB , G2 , KBS , KPrB
h) (KPbB)KPrS mod KPbS , (G1)KPrA mod NA , NA, NB , G2 , KBS , KPrB
i) (KPbB)KPrS mod KPbS , G3 , G2 , KBS , KPrB
j) (KPbB)KPrS mod KPbS , NA , NB , G2 , KBS , KPrB , G3 , (KPbA)KPrS mod KPbS
k) NB

Explain your answer below:

Question 2 Authentication Protocols

Consider the following 4-message protocol:
1. A → S: (B, {(A, K1)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → A: (B, {K2}K1)
Which of the following statements is true, at the end of the protocol, and with regards to the purpose of the protocol:
a) Both A and B establish a session key K2, and B is sure of A's identity
b) Both A and B establish a session key K1, and B is sure of A's identity
c) Both A and B establish a session key K1, and A is sure of B's identity
d) Both A and B establish a session key K1, and both B and A are sure of each other's identity
e) Both A and B establish a session key K2, and A is sure of B's identity
f) Both A and B establish a session key K1
g) Both A and B establish a session key K2
h) Both A and B authenticate each other by knowing each other's identities
i) A ends up knowing B's identity
j) B ends up knowing A's identity
k) None of the above
l) All of the above

Question 3

Non-Repudiation and Anonymity Protocols

For the Zhou-Gollman non-repudiation protocol discussed in the lecture on "Non-Repudiation and Anonymity Protocols", which one of the following statements is false:

a) At time point 4, both A and B can produce evidence to prove that they received K
b) At time point 2, both A and B can produce evidence to prove that they received a signed message from the other party
c) At time point 0, S cannot prove anything
d) At time point 3, B cannot produce evidence to prove that A has access to key K
e) At time point 1, A can prove that B is alive
f) At time point 4, S can prove that A is alive
g) At time point 3, S can produce evidence that that A has access to key K
h) At time point 0, A is not alive
i) At time point 2, A can produce evidence to prove that B is alive
j) At time point 4, the protocol terminates

Question 4 Forwards Secrecy Protocols
Consider the following 4-message protocol:
1. A → S: (B, {(A, K1)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → A: (B, {K2}K1)
Assume three runs of the above protocol, that we call P1, P2 and P3. If after completion of run P3, K1 is compromised, i.e. it is leaked to some external intruder, how would this impact the forward secrecy property of K2 for all the three runs of the protocol P1, P2 and P3? Choose the right answer:
a) Compromising K1 in P3 compromises every other key in all of the three runs of the protocol
b) The secrecy of P3.K2 is not compromised, and therefore P2.K2 and P1.K2 would remain secret
c) Compromising K1 in P3 compromises P3.K2, and therefore, every other previous version of K1 and K2 are also compromised
d) The secrecy of P3.K2 is compromised, but P2.K2 and P1.K2 would remain secret since K1 is refreshed after each run, therefore P3.K1 is different from P2.K1 and is different from P1.K1
e) Even though K1 is compromised in P3, K2 is not compromised in any of the three runs

Question 5 Attacks on Security Protocols
Consider the following 4-message protocol:
1. A → S: (B, {(A, K1)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → A: (B, {K2}K1)
And the following attack trace:
1. I(A) → S: (B, {(A, K)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → I(A): (B, {K2}K)
Which one of these changes to the protocol messages would fix the attack trace above, such as the attack then becomes impossible:
a) 3. B → S: (A, {(B, {K2}KpbA)}KpbS)
b) 4. S → A: (B, {K2, A}K1)
c) 2. S → B: {A}KpbB
d) 2. S → B: B
e) 3. B → S: (A, {(B, {K2}KprS)}KpbS)
f) 1. A → S: {(B, A, K1)}KpbS
g) 1. A → S: (A, {(B, K1)}KpbS)
h) 4. S → A: (B, {K1}K2)
i) 4. S → A: (A, B, {K2}K1)
j) 2. S → B: A, B

Question 6
Mutation and Type-Flaw Attacks
Consider the following 4-message protocol between A and B, where (N+1) represents the increment of N:
1. A → B: (A, {NA}KAB)
2. B → A: {(NA+1, NB)}KAB
3. A → B: {NB+1}KAB
4. B → A: {(K'AB, NA)}KAB
Which of the following mutations to messages of the protocol above, would constitute a harmful attack:
a) 1. A → B: (C, {NA}KAB)
b) 1. A → B: ({NA}KAB, A)
c) 4. B → A: {(KAB, NA)}KAB
d) 4. B → A: {(K'AB, NB+1)}KAB
e) 3. A → B: {NB+1}KpbB
f) 2. B → A: {(NA+1, NA)}KAB

Reference no: EM133373590

Questions Cloud

What observations do you have now about the h&s profession : What do you know now that you didn't know prior to conducting the literature search? What observations do you have now about the H&S profession?
Enormous bingham canyon copper mine : Below is a picture of the enormous Bingham Canyon copper mine in Utah. What is the reason that the mine is so large?.
What type of strategy does starbucks have : What type of strategy does Starbucks have? What sets it apart from its rivals? What is there about the company's strategy that can lead to a sustainable
Discuss the principles of customer behaviour : Outline what quality service is and the legislations which impact the service which is delivered. Discuss how feedback and ideas from staff can be used
How would impact the forward secrecy property : M30606 Computer Security, University of Portsmouth, how would this impact the forward secrecy property of K2 for all the three runs of the protocol
Analyze the causes of problems or successes : Overviewing of the content of the case. Identifying problems/successes. Analyze the causes of problems/successes. Identifying solutions that the case
Climate change denial : Climate change denial before? Do you know anybody who would fit that description?
Define diversity and terms related to diversity : Define diversity and terms related to diversity State the company's policy regarding diversity Describe three benefits of having a diverse work force Identify
Compare the two masses of asteroid and earth : What would be the best way to determine the volume (space) the asteroid took up? Compare the two masses of the asteroid/Earth

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd