Design a key establishment protocol that will allow a Mutually Agreed Session key (Kabc) to be established between three entities A, B and C. This key can then be used to secure a chat between the three entities. I want you to develop your own design based on the conditions below. Note: The session key should NOT be known to the Chat Server (S) and the Chat Server (S) can only forward the encrypted messages to A, B and C and S cannot read the messages, i.e. End to end encryption/privacy is to be used between the chat parties A, B and C. The secure chat between entities A, B and C must use the Chat Server (S) and session key Kabc as below: i.e. A, B and C Do NOT communicate directly and must exchange messages through the Server S. The following conditions apply to your protocol design. 1. A, B and C Never communicate directly. Each entity (A, B, C and S) have a Public Key Certificate, ie. CA<>, CA<>, CA<> and CA<>. The Chat Server, S, has access to all Entity Certificates that use its service and can provide these Certificate to its service users if requested to do so. Each step in establishing the Session key (Kabc) must provide an Authenticated Integrity check of the data transferred. You must show both sides of this in your protocol design and description, i.e. its generation and how it is checked. Each Entity must Authenticate itself to the Server S before it is allowed to use its service. For each of the steps where you use any of CIA (Confidentiality, Integrity or Authentication) please state the algorithm you used to perform that function.  You must provide a legend to describe your notation and a full description of each step in the protocol that is used to establish the shared key Kabc.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Design a key establishment protocol that will allow a Mutually Agreed Session key (Kabc) to be established between

three entities A, B and C. This key can then be used to secure a chat between the three entities. I want you to develop your own design based on the conditions below.

Note: The session key should NOT be known to the Chat Server (S) and the Chat Server (S) can only forward the encrypted messages to A, B and C and S cannot read the messages,
i.e. End to end encryption/privacy is to be used between the chat parties A, B and C.

The secure chat between entities A, B and C must use the Chat Server (S) and session key Kabc as below: i.e. A, B and C Do NOT communicate directly and must exchange messages through the Server S.

The following conditions apply to your protocol design.

1. A, B and C Never communicate directly.

  1. Each entity (A, B, C and S) have a Public Key Certificate, ie. CA<<A>>, CA<<B>>, CA<<C>> and CA<<S>>.

  2. The Chat Server, S, has access to all Entity Certificates that use its service and can provide these Certificate to its service users if requested to do so.

  3. Each step in establishing the Session key (Kabc) must provide an Authenticated Integrity check of the data transferred. You must show both sides of this in your protocol design and description, i.e. its generation and how it is checked.

  4. Each Entity must Authenticate itself to the Server S before it is allowed to use its service.

  5. For each of the steps where you use any of CIA (Confidentiality, Integrity or Authentication) please state the algorithm you used to perform that function. 

You must provide a legend to describe your notation and a full description of each step in the protocol that is used to establish the shared key Kabc.

A
{M1}Kabc
{M2}Kabc
Chat
Server (S)
{M3}Kabc
{M1}Kabc
{M2}Kabc
B
{M3}Kabc
{M3}Kabc
{M1}Kabc
{M2}Kabc
Transcribed Image Text:A {M1}Kabc {M2}Kabc Chat Server (S) {M3}Kabc {M1}Kabc {M2}Kabc B {M3}Kabc {M3}Kabc {M1}Kabc {M2}Kabc
Expert Solution
steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Recovery and Performance of Network
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education