Mutual authentication and key establishment protocol

Assignment Help Computer Engineering
Reference no: EM1319271

Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS. During the protocol, trusted Server produces a fresh, random session key K and distributes it to both Alice and Bob as follows:

1) Alice → Bob. A, NA where NA is fresh and random
2) Bob → Server. B, encKBS (A,NA,NB) where NB is fresh and random
3) Server → Alice. encKAS (B,NA,K),encKBS (A,K), NB where K is a fresh session key
4) Alice → Bob. ????

Goal of the protocol is to:

a) Establish a key which is only known to the Alice and Bob

b) Alice and Bob are confident they are talking to each other (not someone else).

i) What message must Alice send to Bob in step 4 of the protocol? Describe why your solution leads to a protocol which has the above two properties.

ii) Suppose these condmessage of the protocol (fromBobtoServer) is changed to B, encKBS(A,NA),NB. In other words, Bobs nonce NB is not encrypted. Is the protocol still secure? Discuss.

iii) Suppose the third message of the protocol (fromServertoAlice) is changed to B, encKAS(NA,K), encKBS(A,K),NB. In other words, Bobs identity B is not encrypted. Is the protocol still secure? Discuss.

Reference no: EM1319271

Questions Cloud

Question related to descriptive statistics : For the following scores, find the: A. Mean. B Median. C. Sum of squared deviation. D. Variance. E. Standard deviation.
Recover compensation for services : Suppose CCP Management, Inc., entered into a property management agreement with Andrew Hoganmuller and several companies which Hoganmuller operated.
Formulate an integer program that maximizes hagger''s profit : Hagger Engineering Corporation is considering undertaking several proposed projects for the next fiscal year.  The projects, the number of engineers and the number of support personnel necessary for each project.
Assumes the perfectly competitive firm : Assumes the perfectly competitive firm is in long-run equilibrium also there is an rise in Demand
Mutual authentication and key establishment protocol : Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS.
Computing the mean of the sampling distribution : Compute the mean of the sampling distribution? Compute the standard deviation of sampling distribution?
Functions of management in polc model : Robbins and Judge (2013) discussed the four functions of management in the POLC model: Planning, Organizing, Leading, and Controlling. Think about a time in your work, personal or school experience where you have held a position that required you ..
Solve the given equations : Solve the given equations
Calculating mean-median-sum of squared deviation : For the following scores, find the (A) mean, (B) median, (C) sum of squared deviations, (D) variance, and (E) standard deviation:

Reviews

Write a Review

Computer Engineering Questions & Answers

  Aspects of effectiveness and robustness in software

Aspects of effectiveness and robustness in software

  Creating the method

Assume we wish to form a method for class BinaryTree which decides whether two trees have same structure. The header of the method could be as follows: public boolean isIsomorphic(BinaryTreeInterface otherTree).

  How to create a database for music

How to create a database for music? Other entities will be Artist/Group - Attributes will be Name, Year Founded, Origin, Tones and Biography, Track - Attributes will be Number and User's Recommendation and finally Song - Attributes will be Name, ..

  Discuss and describe the potential security threats

Discuss and describe the potential security threats

  How to exchange the floating point number

How to exchange the floating point number

  Programming field as career

Unfortunately, there are fewer women within the programming fields that there are men, encourage women to go into these fields

  What are three goals of safety in computing?

What are three goals of safety in computing?

  Intermediate programming

Design a program that reads in a text file with drawing commands and then outputs a bitmap with all the items drawn correctly

  What are the kinds of information systems

What are the kinds of information systems

  How to illustrate a memory map for a system

Illustrate a memory map for a system with a memory capability of 512MB. Each memory location in system is 8 bits.

  Regarding delivery of the packet wirelessly

Supposing no malfunction in any of stations or nodes of the network, also explain in scholarly detail if it is possible for the packet to be delivered to the wrong destination

  Detail advantages of looping

Detail advantages of looping

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd