Question
Alice and Bob are employees of two different financial investment companies. Alice works for the S&M investment funds that operates in Melbourne and Bob works
Alice and Bob are employees of two different financial investment companies. Alice works for the S&M investment funds that operates in Melbourne and Bob works for MK superfunds that operates in Sydney. Alice and Bob are both familiar with modern cryptograhpic tools and know how to use the tools to perform symmetric and asymmetric encryption algorithms as well as generating hash and message authentication codes. During a conference organised by both companies Alice and Bob have met and exchanged their public keys. Using the provided notation for each of the following scenarios define a protocol that achieves the required goals.
Notation: M is the message (file), H () a cryptographical strong hash function, E () as encryption algorithm corresponding to the specified keys (symmetric for secret key, asymmetric for public /private key), M AC() is a Message Authentication Code algorithm, K xy is a secret key shared between entities X and Y (symmetric algorithm), PU x is the public key and PR x the private key of entity X (symmetric algorithm), II is concatenation function, X → Y specifies X sends to Y.
For each of the scenarios that follows the example you need to:
- define the protocol in one line using the provided notation;
- and then explain clearly why it satisfies the requirements of the given scenario (for instance why an attacker will not succeed and how receiver can verify a whether the required property is achieved).
Example: Alice must send a message over a public network to Bob where only the confidentiality of the message is required and Alice and Bob have already a shared secret K AB .
Protocol: A → B : E (K AB , M)
Explanation: Since Alice and Bob have already a shared secret K AB Alice can use a symmetric encryption algorithm to transform the message to ciphertext. To recover the original plaintext message the knowledge of the secret key is required hence and attacker such as Even who does not know the valui of the Shared secret key K AB cannot recover the original meesage from the captured ciphertext. Bob can recover the message using the decryption algorithm and the shared secret key.
Notes:
- When the scenario asks for efficiency it means you will receive no or partial mark if your proposed protocol is not the most efficient approach that satisfies the requirements.
- You can also use “->” in the place of →, and “K_XY”, “PR_X” notation in place of K XY , PU X and PR X respectively (to simplify the use of your chosen word processor).
- Use concaternation II when the protocol is comprised of multiple parts, for example M II H (M) represents the message and the hash of the message.
- Use brackets to specify the scope of a function, for example E(K AB , M)IIH(M) and E(K AB , MIIH(M)) are two different protocols possibly providing different services.
- You can use both symmetric and asymmetric algorithms in the same protocol when necessary.
Scenarios: Alice need to send a IGB (GigaByte) file to Bob over a public network.
- Explain how Alice could efficiently send the file when it contains public information that must not be tampered with and Bob must know Alice is the only entity who could have sent the file.
- Explain how Alice could efficiently send the file when it contains confidential information and Bob must know Alice is the only entity who could have sent the file, if Alice and Bob already have shared secret.
- Explain how Alice could efficiently send the file that needs to be confidential to Bob when they have not a shared secret.
Step by Step Solution
3.42 Rating (158 Votes )
There are 3 Steps involved in it
Step: 1
1 AB MN MACEMKABKAB Symmetric cryptogray is used MAC ensures the date integrity and and authenticati...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Document Format ( 2 attachments)
60935a975b065_23713.pdf
180 KBs PDF File
60935a975b065_23713.docx
120 KBs Word File
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started