Udp programs allowing two parties to establish a secure

Assignment Help Computer Network Security
Reference no: EM13515804

Write (Java or C/C++) UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs “Host” and “Client”, which are executed by Alice and Bob, respectively. 

Alice and Bob share a common password PW which contains 6 numeric characters. They want to establish a secure communication channel that can provide data confidentiality and integrity. They aim to achieve this goal via the following steps: (1) use the password to establish a shared session key; (2) use the shared key to secure the communication. 

Step 1 is done via the following key exchange protocol: 

1: A ? B: EPW(KA) 

2: B ? A: EPW (KB) 

Alice and Bob then compute the shared key as K = Hash(KA||KB). KA and KB are both 64-bit random binary strings, and || denotes string concatenation. Alice and Bob decide to use RC4 as the encryption function, and SHA-1 as the Hash function. 

After establishing the session key, step 2 is achieved as follows: 

1. Whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob. 

2. Upon receiving a ciphertext C, Bob first runs the decryption algorithm to obtain M||H = DK(C). After that, Bob computes H’ = Hash(K||M) and checks if H = H’. If the equation holds, then Bob accepts M; otherwise, Bob rejects the ciphertext. 

3. The same operations are performed when Bob sends a message to Alice. 

Implementation guidelines 

• Place Host and Client in two separate directories: Alice and Bob. The shared password is located in a file under each directory. 

• Alice executes Host. 

- Host is running and listening to the opened port (you need to select a port for your code). 

•Bob executes Client. 

- Client (Bob) sends a connection request to Host. 

- Client is ready and listens to the port. 

•Host generates a random KA, encrypts it using RC4, and sends the ciphertext to Client. 

• Upon receiving the message from the Host, Client decrypts the message to obtain KA, randomly chooses KB, encrypts it and sends the ciphertext to Host. Client then computes the shared key K based on KA and KB. 

• Upon receiving the message from Client, Host performs the decryption to obtain KB and then computes the shared key K. 

• Now, the secure channel is established. 

- Either Alice or Bob can send a message encrypted and authenticated by the key K. They type the 

message on their own terminal. The message is processed by their code (Host or Client) according to 

the step 2 description given above. 

- The received message is printed on the screen if decryption is successful. Otherwise, print

“decryption error” on the screen. 

- To quit the program, the client should type “exit”. 

Coding requirement: 

You need to write two programs: Host and Client. You should name your programs: host.c or host.cpp or 

host.java and client.c or client.cpp or client.java. 

How to run? 

Your programs should run according to the protocol. Host and Client should be executed on different windows. For convenience of marking, please use the local IP: 127.0.0.1 for the submitted version. For simplicity, there is no GUI required in this assignment. That is, messages are simply typed on the window and printed on the receiver’s window. The looping should continue until the moment the user types “exit” to exit.

Reference no: EM13515804

Questions Cloud

Find out the moles of precipitate which the molarity of ion : 100.0 mL of 0.400 M CoCl2(aq) is mixed with 100.0 mL of 1.600 M NaOH. Determine the moles of precipitate which form, and the molarity of each ion (including spectator ions) after the precipitation process is complete.
Evaluate the potential problems that can exist when : Evaluate the potential problems that can exist when comparability of asset conditions cannot be made within an agency and with other agencies. Suggest how these problems may be minimized
Find how much force does the block exert on bottom of tank : A 6.0kg block of aluminum sits on the bottom of a tank of water. How much force does the block exert on the bottom of the tank
What will the volume of the swim bladder be : We've seen that fish can control their buoyancy through the use of a swim bladder, a gas-filled organ inside the body. What will the volume of the swim bladder be if the fish ascends to a 42ft depth without changing the quantity of gas
Udp programs allowing two parties to establish a secure : Whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob
Compute the new marginal cost and average cost : Edward the entrepreneur takes 2 hours to cut a lawn, and he cuts 1,000 lawns per year. He uses solar-powered equipment (truck and mover) that will last forever
What is the force of his foot on the block : A human sprinter of mass 65kg starts a run at the maximum possible acceleration, pushing backward against a block set in the track
Explain chlorohydrin formation conditions : A racemic product mixture is produced when (Z)-4-ethyl-4-octene is subjected to chlorohydrin formation conditions (Cl2, H2O). Draw both of the enantiomers that are formed.
Calculate how far does it run : A horse can maintain a top speed of 20m/s for a long distance but has a maximum acceleration of only 6.0m/s^2. how far does it run, to the nearest 10m

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find out the security risks with respect to phishing

mobile banking features have added several advantages for customers however there are security risks that come with

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

  Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your readings from this week.

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

  Explain computer forensics software or services

Use a web search engine to search for companies specializing in computer forensics software or services. Select two or three and write a one- to two-page report comparing what each company does.

  You are a senior network engineer at a technology firm

you are a senior network engineer at a technology firm. your company has 500 employees. your ceo meets with you and

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  Application of principles of ethics to ict-related issues

Demonstrate factual knowledge, understanding and the application of principles of ethics to ICT-related issues and demonstrate depth of analysis by examining arguments for one ethical issue related to ICT

  Briefly describe your cryptanalys is methodology

Decrypt this message, and briefly describe your cryptanalys is methodology. In particular, list features of the ciphertext that hindered or helped your decryption process.

  Information security for document management systems

The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..

  Make a 3-4-page memo outlining what you have done as the

over the past several years the chief executive officer ceo of your company has read articles on internet control

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd