Task 1 write java or cc udp programs allowing two parties

Assignment Help Computer Networking
Reference no: EM13371313

Task 1

Write (Java or C/C++) UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.  Alice and Bob share a common password PW which contains 6 numeric characters. They want to establish a secure communication channel that can provide data confidentiality and integrity. They aim to achieve this goal via the following steps: (1) use the password to establish a shared session key; (2) use the shared key to secure the communication.

Step 1 is done via the following key exchange protocol:
1:  A -> B: EPW(KA)
2:  B -> A: EPW (KB)
Alice and Bob then compute the shared key as K = Hash(KA||KB). KA and KB are both 64-bit random binary strings, and || denotes string concatenation. Alice and Bob decide to use RC4 as the encryption function, and SHA-1 as the Hash function.

After establishing the session key, step 2 is achieved as follows:

1.  whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob.
2.  upon receiving a ciphertext C, Bob first runs the decryption algorithm to obtain M||H = DK(C). After that, Bob computes H' = Hash(K||M) and checks if H = H'. If the equation holds, then Bob accepts M; otherwise, Bob rejects the ciphertext.

3.  the same operations are performed when Bob sends a message to Alice.  

You need to write two programs: Host and Client. 

Task 2

Perform a security analysis for the key exchange protocol given in Task 1. Does the protocol provide the property of key authentication? Justify your answer.

Reference no: EM13371313

Questions Cloud

Write an essay explaining the steps involved in endospore : write an essay explaining the steps involved in endospore formation and the function of endospores in
1-as we continue our exploration of signaling pathways in : 1-as we continue our exploration of signaling pathways in cancer one important class of players not discussed in detail
Question 1 the following are the financial statements for : question 1 the following are the financial statements for hugo boss group for the financial years ending 2012 and
Use a graphical illustration to describe briefly what the : use a graphical illustration to describe briefly what the influence of each of the following be on the market supply of
Task 1 write java or cc udp programs allowing two parties : task 1 write java or cc udp programs allowing two parties to establish a secure communication channel. for simplicity
A new program is developed to enrich : a new program is developed to enrich thekindergarteneperience of children in prepararion doe first grade. hillmont
Question 1a marine biologist has evidence from other : question 1a marine biologist has evidence from other studies that the number of fish is declining in certain lakes
Your assignment requires you to identify an entrepreneur of : your assignment requires you to identify an entrepreneur of your choice anda. provide a profile brief of the person you
Part a your first task is to use models and concepts : part a your first task is to use models and concepts relating to producer behaviour to analyse the effects of

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd