Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assume there is a Trusted Third Party ( TTP ) , a client C , and a server S . Setup. TTP will be LU

Assume there is a Trusted Third Party (TTP), a client C, and a server S.
Setup.
TTP will be LU2, Server will be LU22, and the client will be LU4
1) Create a public/private key pair for the TTP.
2) Import public key of TTP for C.
3) Create public/private key pair for S.
4) Have TTP sign the public key for S.
C now wants to connect to S.
Handshake
5) C downloads signed public key of S
6) Verify the public keys signature is correct.
7) C encrypts Hello using Ss public key
8) S decrypts the message and sends back a list of supported symmetric-key algorithms (e.g.
AES-128-CBC, etc.) and hash functions (e.g. MD5, SHA1, etc.)
You can pick the list of algorithms
9) C selects one of the symmetric-key algorithms and one of the hash functions, generates a
symmetric key, and sends that symmetric key and selected algorithms, encrypted under Ss
public key. If needed, make sure you are also send the IV (Initialization Vector).
You can decide on the format, whether its space-separated or comma-separated or lineseparated. You can assume both C and S know the format.
10) C encrypts Ready using the symmetric key and creates a hash (for integrity).
11) C sends both the encrypted message and hash to S.
12) S verifies integrity of message and decrypts the message.
13) S encrypts Ready 2! using the symmetric key and creates a hash.
14) S sends both the encrypted message and hash to C.
15) C verifies integrity of message and decrypts the message.
Can you show the step by step commands for each part when working in the command prompt.
HINT:
-Public key encryption use gpg
~gpg --full-generate-key
~gpg --import
~gpg --export
~gpg --sign
~gpg --encrypt --recipient "..." message.txt
~gpg --list-public-keys
-Symmetric key encryption - use openssl
~openssl enc -ALGO -e -in input.txt -out output.enc -K KEY -iv IV
~openssl enc -ALGO -d -in output.enc -out input.txt -K KEY -iv IV
~openssl dgst -ALGO output.enc > output.hash

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 33rd International Conference Dexa 2022 Vienna Austria August 22 24 2022 Proceedings Part 2 Lncs 13427

Authors: Christine Strauss ,Alfredo Cuzzocrea ,Gabriele Kotsis ,A Min Tjoa ,Ismail Khalil

1st Edition

3031124251, 978-3031124259

More Books

Students also viewed these Databases questions

Question

Determine the values of the following quantities: a. b. c. d. e. f.

Answered: 1 week ago