Question

In this task, you need to critically analyze the below protocols and clearly explain which protocol...

In this task, you need to critically analyze the below protocols and clearly explain which protocol or protocols would be secured and why.

The prospective security protocols are as follows:

Alice --> msg1 --> Bob
Alice <-- msg2 <-- Bob
Alice --> Rb --> Bob

a) In protocol-1, Message 1: E(“Alice”, K, RA, KAB), Message 2: RA, E(RB, KAB)

b) In protocol-2, Message 1: “Alice”, E(K, RA, KAB), Message 2: RA, E(RB, K)

c) In protocol-3, Message 1: “Alice”, E(K, RA, KAB), Message 2: RA, E(RB, KAB)

d) In protocol-4, Message 1: “Alice”, RA, Message 2: E(K, RA, RB, KAB)

Note:

K : Session key

RA : Nonce generated by Alice

RB : Nonce generated by Bob

KAB : Shared secret key between Alice and Bob

E(“Message”, KAB) : Symmetric Encryption Function that encrypts “Message” using KAB

Homework Answers

Answer #1

Protocol 2 is used between alice and bob as, protocol 2 is a practical, mutual authentication, and the session key K is secure.

As the protocol uses In protocol-2, Message 1: “Alice”, E(K, RA, KAB), Message 2: RA, E(RB, K), which shows mutual authentication between sender and receiver, so protocol 2 is secured and used.

----------------------------------------Please Upvote--------------------------------------------------------------------------------------------

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables...
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server’s public key KS. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows: Alice ⇒ Server: KS{KA} Bob ⇒ Server: KS{K} Server ⇒...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations. 2 points    QUESTION 20 Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate. 2 points    QUESTION 21 Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
What tools could AA leaders have used to increase their awareness of internal and external issues?...
What tools could AA leaders have used to increase their awareness of internal and external issues? ???ALASKA AIRLINES: NAVIGATING CHANGE In the autumn of 2007, Alaska Airlines executives adjourned at the end of a long and stressful day in the midst of a multi-day strategic planning session. Most headed outside to relax, unwind and enjoy a bonfire on the shore of Semiahmoo Spit, outside the meeting venue in Blaine, a seaport town in northwest Washington state. Meanwhile, several members of...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT