Write udp programs to establish communication channel

Assignment Help Computer Network Security
Reference no: EM131018347

Assignment

Objectives

On completion of this assignment you should be able to:

- Understand some basic techniques for building a secure channel.
- Understand network programming.

Write (Java or C/C++) UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.

Alice and Bob share a common password PW which contains 8 alphanumeric characters. They want to establish a secure communication channel that can provide data confidentiality and integrity. They aim to achieve this goal via the following steps: (1) use the password to establish a shared session key; (2) use the shared key to secure the communication.

Step 1 is done via the following key exchange protocol:

1: A → B: EPW(KA)
2: B → A: EPW (KB)

Alice and Bob then compute the shared key as K = Hash(KA||KB). KA and KB are both 128-bit random binary strings, and || denotes string concatenation. Alice and Bob decide to use AES as the encryption function, and MD5 as the Hash function.

After establishing the session key, step 2 is achieved as follows:

1. whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob.

2. upon receiving a ciphertext C, Bob first runs the decryption algorithm to obtain M||H = DK(C). After that, Bob computes H' = Hash(K||M) and checks if H = H'. If the equation holds, then Bob accepts M; otherwise, Bob rejects the ciphertext.

3. the same operations are performed when Bob sends a message to Alice.

Implementation guidelines

- Place Host and Client in two separate directories: Alice and Bob. The shared password is located in a file under each directory.

- Alice executes Host.

- Host is running and listening to the opened port (you need to select a port for your code).

- Bob executes Client.

- Client (Bob) sends a connection request to Host.

- Client is ready and listens to the port.

- Host generates a random KA, encrypts it using AES, and sends the ciphertext to Client.

- Upon receiving the message from the Host, Client decrypts the message to obtain KA, randomly chooses KB, encrypts it and sends the ciphertext to Host. Client then computes the shared key K based on KA and KB.

- Upon receiving the message from Client, Host performs the decryption to obtain KB and then computes the shared key K.

- Now, the secure channel is established.

- Either Alice or Bob can send a message encrypted and authenticated by the key K. They type the message on their own terminal. The message is processed by their code (Host or Client) according to the step 2 description given above.

- The received message is printed on the screen if decryption is successful. Otherwise, print "decryption error" on the screen.

- To quit the program, the client should type "exit".

Coding requirement:

You need to write two programs: Host and Client. You should name your programs: host.cpp or host.java and client.cpp or client.java.

You can choose to use some existing libraries or free source code to implement AES and MD5. You should cite the source if you use a downloaded code. Important: make sure your programs can be complied and executed in banshee (banshee.uow.edu.au).

How to run?

Your programs should run according to the protocol. Host and Client should be executed on different windows. For convenience of marking, please use the local IP: 127.0.0.1 for the submitted version. For simplicity, there is no GUI required in this assignment. That is, messages are simply typed on the window and printed on the receiver's window. The looping should continue until the moment the user types "exit" to exit.

Reference no: EM131018347

Questions Cloud

Explain how zappos has implemented social : Explain how zappos has implemented social responsibility programs into its business
Compare a public network to a private network : Explain the various privacy rights that businesses on the Web are lawfully obligated to adhere to. Describe some of the gray areas in enforcing these laws on the Internet.
What are the advantages and disadvantages of bpm : What are the advantages and disadvantages of BPM? How do "value chain" principles apply to BPR and BPM? Why should an IT manager know the differences between the concepts?
Write an equation for joe production possibility frontier : Suppose Joe has sixty hours of labor available to produce windows and doors. Write an equation for Joe's production possibility frontier for these two goods based on the above information. Write this equation in slope intercept form and measure wi..
Write udp programs to establish communication channel : Write UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.
What should the organization do with regard to marketing : What can you tell about their business health? What should this organization do with regard to marketing? This is where all those years of education start to pay off.
Describe the appearance of red blood cells : 1. Describe the appearance of red blood cells (RBCs), white blood cells (WBCs),and platelets.2. Describe the function of RBCs, WBCs, and platelets.
Establish a secure communication channel : Understand some basic techniques for building a secure channel - Understand network programming and Write UDP programs allowing two parties to establish a secure communication channel.
Why is business ethics such an important topic : What makes the accounting profession different to the point that professional ethics becomes a defining characteristic?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Company financial embezzlement cases

Article topic ideas: Information breaches (these will be the vast majority), disgruntled employee cases involving data theft or leaking of information and company financial embezzlement cases that are directly related to IT

  Suggest mitigation strategies for vulnerabilities identified

Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network.

  What additional level of internet protection have children

What additional level of internet protection should children have over adults? Provide explanations for the following situations:

  Network security and access control

Network Security and Access Control-You are a senior network security professional at your company. Your company has 150 employees

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

  Determine whether or not the assertion is true

DES operating on a general plaintext input first with key K1 and then with key K2 produces the same output as if K2 were first used and then K1.

  Identify the anomaly in the traffic organisation going

Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim. What sort of utility or tool do you think the "attacker"is using to conduct this attack

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  Root certificate authority and an intermediate ca

Is a cryptographic hash function/digest considered encryption - explain three vulnerabilities from the latest Open Web Application Security Project (OWASP).

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd