What is the second message

Assignment Help Computer Network Security
Reference no: EM132139029

Suppose Alice wants to communicate with Bob using symmetric key cryptography with a session key KS.

They have no public key cryptography and they intend to use a key distribution center (KDC).

The KDC is a server that shares a unique secret symmetric key with each registered user. For Alice and Bob, denote these keys by KA-K and KB-K.

Design a scheme that uses the KDC to distribute KS to Alice and Bob. Assume that KS is assigned by the KDC and is initially unknown to Alice and Bob.

Your scheme should use three messages to distribute the session key: a message from Alice to the KDC; a message from the KDC to Alice; and finally a message from Alice to Bob. The first message is KA-K(A, B).

Assume that the KDC and Bob know that they should use KA-K and KB-K, respectively, to decrypt the messages they receive from Alice. Using the notation: KA-K, KB-K, KS, A, and B to answer the following questions.

a. What is the second message?

b. What is the third message?

c. What is the main advantage of first distributing a session key and then using symmetric-key cryptography rather than using public-key cryptography techniques for the whole communication?

Reference no: EM132139029

Questions Cloud

What would be the worst case time to print all words : What would be the worst case time to print all words and their frequencies, in alphabetical order of the words?
Advantages of using social networks in hospitality business : Written research proposal that is based on the literature review. Topic - ADVANTAGES AND DISADVANTAGES OF USING SOCIAL NETWORKS IN HOSPITALITY BUSINESS
Discuss about the multidimensional partitioning approach : Suppose that an application has M input variables and that each variable partitions the input space into N equivalence classes.
Critically review the statement on corporate governance : HC1010 Group Assignment Question - Finally, you are required to visit the company's website and critically review the statement on corporate governance
What is the second message : What is the main advantage of first distributing a session key and then using symmetric-key cryptography rather than using public-key.
What does the super keyword represents : What does the super keyword represents and where can it be used? Give an example of a superclass and subclass.
How to process such a drug order of k requests : MailDrugs has a practically unlimited supply of n distinctly sized empty drug bottles, each specified by its capacity in milliliters (such 150 ml or 325 ml).
Do you think radix exchange sort is good for this case : Since it is just a one-year-old company, the inventory database now contains only 2000 distinct product codes, in the range from 1 to 3000.
Write a method to create two instances of this bowler class : The Bowler class has two fields, a full name and a high score. Write the main() method to create two instances of this Bowler class.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is a honeypot

How has honeypots been used in the field of national security?

  Examine three security issues that could arise

These services provide a virtualization infrastructure that covers data storage, networking, desktop computing, mobile computing, and so on.

  Selecting an expert for an expert witness opinion

Describe two IT certifications that may be considered when selecting an expert for an expert witness opinion.  Research and provide details on the hourly estimates for using these types of professional witnesses.   Then, discuss the typical backgroun..

  Create a diagram of a virtual server environment

Assignment: Disaster Recovery and High Availability. In this assignment, you will have the opportunity to create a diagram of a virtual server environment.

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  Security suppose you have recently responded to your first

suppose you have recently responded to your first computer forensic incident based on the results of your investigation

  Develop a proposal for implementing it security management

Utilizing your comprehensive Security plan outline, develop a proposal for implementing IT Security Management.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  What data or property is threatened and how critical is it

What data or property is threatened and how critical is it? What is the impact on the business should the attack succeed? Minimal, serious, or critical?

  Describe a meet in the middle attack

1. Answer the following questions brieflya. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.

  Discuss the elements of a security system design

Discuss and share your thoughts on the evolution of IEEE standard. Discuss the element of a security system design and provide practical examples in your paper.

  How can we identify security risks and assess their levels

So, how can we identify security risks, assess their levels, implement appropriate tests and other controls, and report security test results based on risk?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd