Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Assume there is a Trusted Third Party ( TTP ) , a client C , and a server S . Setup. TTP will be LU
Assume there is a Trusted Third Party TTP a client C and a server S
Setup.
TTP will be LU Server will be LU and the client will be LU
Create a publicprivate key pair for the TTP
Import public key of TTP for C
Create publicprivate key pair for S
Have TTP sign the public key for S
C now wants to connect to S
Handshake
C downloads signed public key of S
Verify the public keys signature is correct.
C encrypts Hello using Ss public key
S decrypts the message and sends back a list of supported symmetrickey algorithms eg
AESCBC etc. and hash functions eg MD SHA etc.
You can pick the list of algorithms
C selects one of the symmetrickey algorithms and one of the hash functions, generates a
symmetric key, and sends that symmetric key and selected algorithms, encrypted under Ss
public key. If needed, make sure you are also send the IV Initialization Vector
You can decide on the format, whether its spaceseparated or commaseparated or lineseparated. You can assume both C and S know the format.
C encrypts Ready using the symmetric key and creates a hash for integrity
C sends both the encrypted message and hash to S
S verifies integrity of message and decrypts the message.
S encrypts Ready using the symmetric key and creates a hash.
S sends both the encrypted message and hash to C
C verifies integrity of message and decrypts the message.
Can you show the step by step commands for each part when working in the command prompt.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started