Professional Documents
Culture Documents
Computer Security Coursework - Assignment
Computer Security Coursework - Assignment
M30606
Due Date: 2023-03-31
Question 1:
The correct answer is E because it attempts the protocol that consists of 3
messages.
interception A −→ O(B) : m
injection O(A) −→ B : m
cryptography cannot be broken by the adversary, hence we represent the nth stage
of the mth sessions by m.n.
1.1 a −→ s : a, b
The hacker I hijacks the communication from sender a to recipient b, replacing a's
identity with x.
Because I am aware of this key, I can further assume the identity of b and discover
all the data that an is going to provide to b. As a result, a will believe that the
conversation with b has indeed been successfully concluded and she's actually
sharing the key information with b.
Question 2:
F is the right answer Because, KAB doesn't really contain any information about the
a or B. KAB is just a symbolic term for the bit string indicating the secret expected to
be exchanged by the principal that take on the identities of A and B observe the
severely incomplete method specification that utilizes both M, N & hM, Ni to express
the concatenation.
Assume that each user who can play the part U in the system has access to the
secret key sk(U, S), which is shared at the beginning by the server assuming the
position S. The symbol |m |k indicates encryption algorithm of m with key
1.A −→ S : A, B
Question 3:
Part D is False
According to the Zhou- Gollman
It appears that your reference's notation begins at point in time 0, with 5 steps.
Changing the answer's numbering to correspond to the inquiry.
A - Origin
B - Recipient
➔ Part A is TRUE
Explanation: Step 3: R executes an ftp connection with TTP and key confirmation.
➔ Part B is TRUE
➔ Part C is TRUE
Explanation: Till the Step 0, Only O -> R communication is there. S is not involved
at all.
➔ PART D is FALSE.
Explanation: Step 3, B performs the ftp with TTP and gets confirmation of key Conk.
➔ Part E is TRUE
Explanation: In 2nd step, Recipient sends the signature to Origin. Hence , A can
verify that B is still alive..
➔ Part F is TRUE.
Explanation: At step 4, FTP is being used with confirmation flags between A & S.
➔ Part G is TRUE
Explanation: Step 3, O -> TTP, A sends key to S, hence S can prove that A has
access to key.
➔ Part H is FALSE.
Explanation: A starts the entire procedure. To begin the procedure, you must be
alive.
➔ Part I is TRUE
➔ Part J is TRUE.
Question 4:
Explanation-
It simply means that a packet containing the key KpbS and the identity of A has been
sent to S.
Key K1 is for communication between A and B
2. S → B: A
Message is decrypted by B
That simply means that a packet with the key KpbS and the Identity of B has been
sent to S.
4. S → A: (B, {K2}K1)
From the above Protocol we get that the message is sent from A to B
and B to A
K1 Key For A to B
K2 Key For B to A
We have Three Runs So All the Keys are independent of each other.
For P3
P3.K1 is compromised
Question 5:
B is erroneously assuming that KbpB is the 1st step and that communication with A
is necessary.
means
A is contacting "S" by sending the identities of the B & {(A,K1)}KpbS they are going
to share the secret
2. S ->B: A
"S" is sending the secret to "A" to "(B,{k2}K1)"fresh key generated for the 2 of them
by S
Step 2
2. S ->B: A
Question 6:
B has just received the following message, which represents a cryptographic data
object:
{(
)}KBS
The following explains various terms in this object and some of the abbreviations
used:
- {|M|} K represents the digital signing of some message/data M using the key K
- NX represents a nonce (i.e. a fresh and possibly random number used once only)
generated by X
- KpbX represents the public part of the key pair presumably owned by X
- KprX represents the private part of the key pair presumably owned by X
- K (or K1, K2, K3 etc.) represents some arbitrary key with no assumptions about its
scope
References
ed.). Springer.