Design a security protocol that will allow a Mutually Agreed Session key (Kabc) to be established between three entities A, B and C. This key can then be used to secure a chat between the three entities.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Design a security protocol that will allow a Mutually Agreed Session key (Kabc) to be established between three entities A, B and C. This key can then be used to secure a chat between the three entities.

I want you to develop your own design based on the conditions below.
Note: The session key should NOT be known to the Chat Server (S) and the Chat Server (S) can only forward the encrypted messages to A, B and C and S cannot read the messages.

The secure chat between entities A, B and C must use the Chat Server (S) and session key Kabc as below: (refer image)
i.e. A, B and C Do NOT communicate directly.


The following conditions apply to your protocol design.
1. A, B and C Never communicate directly.


2. Each entity (A, B, C and S) have a Public Key Certificate, ie. CA<<A>>, CA<<B>>, CA<<C>> and CA<<S>>.


3. The Chat Server, S, has access to all Entity Certificates that use its service and can provide these Certificate to its service users if requested to do so.


4. Challenge – Response process is to be used to establish freshness of communications between A, B and C.


5. Each step in establishing the Session key (Kabc) must provide an Authenticated Integrity check of the data transferred. You must show both sides of this in your protocol description, i.e. its generation and how it is checked.


6. Each Entity must Authenticate itself to the Server S before it is allowed to use its service.

7. For each of the steps where you use CIA (Confidentiality, Integrity or Authentication) please state the algorithm you would use to perform that function. This is to be provided in the description you will provide for the protocol.

You must provide a legend to describe your notation and a full description of each step in the protocol that is used to establish the shared key Kabc.

Chat
Server (S)
{M2}Kabc
{M1}Kabc
{M3}Kabc
{M1}Kabc
{M2}Kaby/
{M1}Kabc
{M3}Kabc
{M3}Kabx
A
{M2}Kabc
B.
Transcribed Image Text:Chat Server (S) {M2}Kabc {M1}Kabc {M3}Kabc {M1}Kabc {M2}Kaby/ {M1}Kabc {M3}Kabc {M3}Kabx A {M2}Kabc B.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Recovery and Performance of Network
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education