Question

In: Computer Science

B. The following is a key exchange protocol used by two clients, A and B, to...

B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server.

I. A → S : A, B

II. S → A : (???) ??? ,( ???) ???

III. A → B : (???) ??? , A

 Identify the attack that can be executed against this protocol, assuming that an attacker C can eavesdrop, block, or modify all messages. The attacker also has access to old (expired) keys.

C. The above protocol is now modified to become

I. A → S : A, B

II. S → A : (???, B) ??? ,( ???, A) ???

III. A → B : (???, A) ???

 Why does the new modification improve the security over the old version? Identify the new vulnerability that exists in the new version

D. The above protocol is now modified to become

I. A → S : A, B, NA

II. S → A : (???, B, NA,( ???, A) ??? ) ???

III. A → B : (???, A) ??? IV. B → A : (NB) ??? V. A → B : (NB − 1) ???

 Identify the vulnerability in this new version.

E. Modify the protocol in part (D) to have a secure protocol.

Solutions

Expert Solution

SOLUTION

Two Clients A and B, Obtained Symmetric Key- KAB with a trusted server S.

Previously obtained symmetric keys KAS & KBS (securely with the server).

Assume anyone can secretly obtain the secure key with the server.

I. A -> S: A,B

II. S -> A: A: (KAB) KAS, (KAB) KBS

III. A-> B: (KAB) KBS , A

Since the attacker C can eavesdrop, block or modify all messages and has access to old expired keys, C able to reroute the messages to any client. And Hence C has the ability to break the protocol without even breaking the cipher.

Possible Attack 1:

I. A -> S: A,B

II. S -> A: (KAB) KAS, (KAB) KBS

III. A-> C: (KAB) KBS , A

IV. C ->B: (KAB) KBS, D

Here an attacker C interrupts the messages between A and B and modifies D’s Identity as A. So B is misunderstood that he shares information with D but communicates with A.

Possible Attack 2:

I. A -> C: A,B

II. C -> S: A,C

III. S -> C: (KAC) KAS, (KAC) KCS

IV. C -> A: (KAC) KAS, (KAC) KCS

V. A-> C: (KAC) KCS , A

Here an attacker C intervenes in the communication from A with B and reads all messages by A.

I. A -> S: A,B

II. S -> A: (KAB,B) KAS, (KAB,A) KBS

III. A-> B: (KAB,A) KBS .

The above protocol is improved by the previous one by adding the identity of the clients but still not secured since an attacker able to get the value of KAB in any previous run of the protocol.

Possible Attack 1:

I. A -> C: A,B

II. C -> A: (KAB’,B) KAS, (KAB’,A) KBS

III. A-> B: (KAB’,A) KBS .

KAB’ is the old session key used by A and B and try to break the key even breaking is not possible resend the old message will create lots of problems.

I. A -> S: A,B,NA

II. S -> A:(KAB, B, NA, (KAB,A),KBS) KAS

III. A-> B: (KAB, A)KBS

IV. B-> A: (NB ), KAB

V. A-> B: (NB-1), KAB

Time Stamp or Random Values (NA & NB) is added is an enhancement of this protocol, but still, it has some vulnerability since an attacker knows old session keys, he can use the same in the last three messages. B may think he communicates with a using new session key but communicates with an attacker using old session keys.

Final Secure Protocol:

I. A -> S: A,B,NA,NB

II. S -> A:(KAB, B, NA) KAS (KAB,A, NB) KBS

III. A-> B: (KAB, A, NB)KBS

IV. B-> A: B, NB


Related Solutions

. The following is a key exchange protocol used by two clients, A and B, to...
. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas...
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas given in Problem 1.Suppose that Alice selected random numbera= 3and Bob selectedb= 4, show the stepsperformed by Alice and Bob to obtain their shared key. What isthe key?
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b-...
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b- Explain the role of packet sniffing and protocol analyzers as used in intrusion detection systems c-List and specifically describe the 802.x Ethernet frame header fields that would be important to Network Forensic analysis d- List and specifically describe the 802.x Wireless Ethernet frame header fields that would be important to Network Forensic analysis
Let’s assume A and B are creating a secret key using Diffie Hellman key exchange. Assume...
Let’s assume A and B are creating a secret key using Diffie Hellman key exchange. Assume q = 13 and A’s secret is 10 and B’s secret is 5. ⦁   Find all primitive roots of q = 13. (Show the table) ⦁   Find the secret key generated when the primitive root 6 is used. ⦁   Let’s say there is C, that uses a secret AC = 8 with A and secret BC = 12 with B. Find the shared keys...
The following questions relate to the protocol used to manage the health of the network and...
The following questions relate to the protocol used to manage the health of the network and allow network devices to communicate to each other to keep network traffic flowing freely. An example of a common command that uses this protocol is ‘ping’. (10 marks total) What is the name of this protocol? (1 mark) What layer of the TCP/IP network model does this protocol belong? (1 mark) What is the command used to display a path that network traffic takes...
What is the 2PC protocol, and what is it used for?
What is the 2PC protocol, and what is it used for?
What is the default protocol used in AD?What is Kerberos?Describe what the following are:...
What is the default protocol used in AD?What is Kerberos?Describe what the following are: Trees, Forest, Domains, and OUWhere is the default database for AD located?
Consider a 2x2 exchange economy where the two individuals A and B engaged in the exchange...
Consider a 2x2 exchange economy where the two individuals A and B engaged in the exchange of the two goods x and y have utility functions U A = x A − y A − 1 and U B = y B − x B − 1, respectively. The individuals' endowments are { ( w A x , w A y ) , ( w B x , w B y ) } = { ( 5 , 10 )...
The waiting times X and Y (in minutes) of two clients A and B who are...
The waiting times X and Y (in minutes) of two clients A and B who are standing in line at two different check outs in the supermarket are modeled as independent, exponential random variables with parameter 1. (a) Find the cumulative distribution function of the random variable M :=min{X,Y} where min{x,y} is just the smaller value of the two numbers. (b) Find the probability density function of M. Do you recognize the socalled probability law or probability distribution of the...
Develop a program using python to demonstrate data exchange using USB protocol.
Develop a program using python to demonstrate data exchange using USB protocol.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT