Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4. (5 Marks) The following protocol is used in fincorp.com The network is comprised of N nodes, and each node X has been assigned a

image text in transcribed

4. (5 Marks) The following protocol is used in fincorp.com The network is comprised of N nodes, and each node X has been assigned a unique master secret key Kx which is shared between that node and the KDC. The key is used to secure communication between the node and the trusted server KDC. That is, a copy of all the keys are stored on the server. A user such as Alice sends a secret message M to Bob using the following protocol 1. A KDC : IDAI IE(KA, IDBI IKs) where Ks is a random 128-bit session key generated by A IDA is Alice's node id and IDB 1s destination's node id (Bob) 2. KDC -A E(KB, Ks) B knows KB, thus decrypts E(KB, Ks) to get Ks and will subsequently use Ks to decrypt E(Ks, M) to get M. Notes: The protocol uses AES in Counter mode (AES-CTR) for confidentiality (E) in aforementioned steps) where 128-bit random IV is sent as the first block of the cipher text The node IDs are known to all N participants and are each 128-bit values. For instance you can think of Alice's ID as the first 128-bit of SHA256 hash of string alice. The protocol must be resistant to insider attack (for instance by Zack who is an employee of fincorp) (a) Clearly state whether this protocol is secure or not (whether M can be recovered by an attacker or not) (b) Justify your answer. 4. (5 Marks) The following protocol is used in fincorp.com The network is comprised of N nodes, and each node X has been assigned a unique master secret key Kx which is shared between that node and the KDC. The key is used to secure communication between the node and the trusted server KDC. That is, a copy of all the keys are stored on the server. A user such as Alice sends a secret message M to Bob using the following protocol 1. A KDC : IDAI IE(KA, IDBI IKs) where Ks is a random 128-bit session key generated by A IDA is Alice's node id and IDB 1s destination's node id (Bob) 2. KDC -A E(KB, Ks) B knows KB, thus decrypts E(KB, Ks) to get Ks and will subsequently use Ks to decrypt E(Ks, M) to get M. Notes: The protocol uses AES in Counter mode (AES-CTR) for confidentiality (E) in aforementioned steps) where 128-bit random IV is sent as the first block of the cipher text The node IDs are known to all N participants and are each 128-bit values. For instance you can think of Alice's ID as the first 128-bit of SHA256 hash of string alice. The protocol must be resistant to insider attack (for instance by Zack who is an employee of fincorp) (a) Clearly state whether this protocol is secure or not (whether M can be recovered by an attacker or not) (b) Justify your

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Subjective norms, i.e. the norms of the target group

Answered: 1 week ago