Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You have the message sequence below. Msg1. AS :{A, N1, Message1, h(A, N1, Message1)}{K1} Msg2. SB :{A, N1, Message1, h(A, N1, Message1)}{K2} Msg3. BA :

You have the message sequence below.

Msg1. AS :{A, N1, Message1, h(A, N1, Message1)}{K1}

Msg2. SB :{A, N1, Message1, h(A, N1, Message1)}{K2}

Msg3. BA : B, N1, Message2, h(B, N1, Message2)

Whereas:

h(m) represents the digest of the message (m).

{m}{K} represents the encryption of message (m) using the key (K)

N1 is a random number.

1) What are the main objectives of the protocol. [ 5 Marks]

a) Define the roles of each participating party in the protocol

[ 2 Marks]

b) Based on your understanding of cryptographic systems, suggest approaches to share the keys K1 and K2.

[3 Marks]

2) Based on your understanding of the protocol above, explain the followings:
a) The reason why N1 is included in Msg3.

[2 Marks]

b) The reason why A is included in the digest calculation.

[3 Marks]

3) The protocol has a serious vulnerability, show the sequence of the message for this vulnerability and then explain the outcome of this vulnerability.

[10 Marks]

image text in transcribed
Question 1: You have the message sequence below. Msg1.A S:{A, N1, Message1, h(A, N1, Message 1)}{K1} Msg2. S-B:{A, N1, Message1, h(A, N1, Message1)}{K2} Msg3. B-A:B, N1, Message2, h(B, N1, Message2) Whereas: h(m) represents the digest of the message (m). {m}{K} represents the encryption of message (m) using the key (K) N1 is a random number. 1) What are the main objectives of the protocol. [ 5 Marks] a) Define the roles of each participating party in the protocol [2 marks] b) Based on your understanding of cryptographic systems, suggest approaches to share the keys K1 and K2 [3 Marks] 2) Based on your understanding of the protocol above, explain the followings: a) The reason why N1 is included in Msg3. [2 marks] b) The reason why "A" is included in the digest calculation. [3 Marks) 3) The protocol has a serious vulnerability, show the sequence of the message for this vulnerability and then explain the outcome of this vulnerability. [10 Marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

1. What is Ebola ? 2.Heart is a muscle? 3. Artificial lighting?

Answered: 1 week ago