What is the second message

Assignment Help Computer Network Security
Reference no: EM132139029

Suppose Alice wants to communicate with Bob using symmetric key cryptography with a session key KS.

They have no public key cryptography and they intend to use a key distribution center (KDC).

The KDC is a server that shares a unique secret symmetric key with each registered user. For Alice and Bob, denote these keys by KA-K and KB-K.

Design a scheme that uses the KDC to distribute KS to Alice and Bob. Assume that KS is assigned by the KDC and is initially unknown to Alice and Bob.

Your scheme should use three messages to distribute the session key: a message from Alice to the KDC; a message from the KDC to Alice; and finally a message from Alice to Bob. The first message is KA-K(A, B).

Assume that the KDC and Bob know that they should use KA-K and KB-K, respectively, to decrypt the messages they receive from Alice. Using the notation: KA-K, KB-K, KS, A, and B to answer the following questions.

a. What is the second message?

b. What is the third message?

c. What is the main advantage of first distributing a session key and then using symmetric-key cryptography rather than using public-key cryptography techniques for the whole communication?

Reference no: EM132139029

Questions Cloud

What would be the worst case time to print all words : What would be the worst case time to print all words and their frequencies, in alphabetical order of the words?
Advantages of using social networks in hospitality business : Written research proposal that is based on the literature review. Topic - ADVANTAGES AND DISADVANTAGES OF USING SOCIAL NETWORKS IN HOSPITALITY BUSINESS
Discuss about the multidimensional partitioning approach : Suppose that an application has M input variables and that each variable partitions the input space into N equivalence classes.
Critically review the statement on corporate governance : HC1010 Group Assignment Question - Finally, you are required to visit the company's website and critically review the statement on corporate governance
What is the second message : What is the main advantage of first distributing a session key and then using symmetric-key cryptography rather than using public-key.
What does the super keyword represents : What does the super keyword represents and where can it be used? Give an example of a superclass and subclass.
How to process such a drug order of k requests : MailDrugs has a practically unlimited supply of n distinctly sized empty drug bottles, each specified by its capacity in milliliters (such 150 ml or 325 ml).
Do you think radix exchange sort is good for this case : Since it is just a one-year-old company, the inventory database now contains only 2000 distinct product codes, in the range from 1 to 3000.
Write a method to create two instances of this bowler class : The Bowler class has two fields, a full name and a high score. Write the main() method to create two instances of this Bowler class.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd