Design a security protocol that will allow a Mutually Agreed Session key (Kabc) to be established between three entities A, B and C. This key can then be used to secure a chat between the three entities. I want you to develop your own design based on the conditions below. Note: The session key should NOT be known to the Chat Server (S) and the Chat Server (S) can only forward the encrypted messages to A, B and C and S cannot read the messages. The secure chat between entities A, B and C must use the Chat Server (S) and session key Kabc as below: i.e. A, B and C Do NOT communicate directly. The following conditions apply to your protocol design. 1. A, B and C Never communicate directly. 2. Each entity (A, B, C and S) have a Public Key Certificate, ie. CA<>, CA<>, CA<> and CA<>. 3. The Chat Server, S, has access to all Entity Certificates that use its service and can provide these Certificate to its service users if requested to do so. 4. Challenge – Response process is to be used to establish freshness of communications between A, B and C. 5. Each step in establishing the Session key (Kabc) must provide an Authenticated Integrity check of the data transferred. You must show both sides of this in your protocol description, i.e. its generation and how it is checked. 6. Each Entity must Authenticate itself to the Server S before it is allowed to use its service. 7. For each of the steps where you use CIA (Confidentiality, Integrity or Authentication) please state the algorithm you would use to perform that function. This is to be provided in the description you will provide for the protocol. You must provide a legend to describe your notation and a full description of each step in the protocol that is used to establish the shared key Kabc.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Design a security protocol that will allow a Mutually Agreed Session key (Kabc) to be established between three entities A, B and C. This key can then be used to secure a chat between the three entities. I want you to develop your own design based on the conditions below. Note: The session key should NOT be known to the Chat Server (S) and the Chat Server (S) can only forward the encrypted messages to A, B and C and S cannot read the messages. The secure chat between entities A, B and C must use the Chat Server (S) and session key Kabc as below: i.e. A, B and C Do NOT communicate directly. The following conditions apply to your protocol design. 1. A, B and C Never communicate directly. 2. Each entity (A, B, C and S) have a Public Key Certificate, ie. CA<>, CA<>, CA<> and CA<>. 3. The Chat Server, S, has access to all Entity Certificates that use its service and can provide these Certificate to its service users if requested to do so. 4. Challenge – Response process is to be used to establish freshness of communications between A, B and C. 5. Each step in establishing the Session key (Kabc) must provide an Authenticated Integrity check of the data transferred. You must show both sides of this in your protocol description, i.e. its generation and how it is checked. 6. Each Entity must Authenticate itself to the Server S before it is allowed to use its service. 7. For each of the steps where you use CIA (Confidentiality, Integrity or Authentication) please state the algorithm you would use to perform that function. This is to be provided in the description you will provide for the protocol. You must provide a legend to describe your notation and a full description of each step in the protocol that is used to establish the shared key Kabc.

Chat
Server (S)
{M2}Kabc
{M1}Kabc
{M3}Kabc
{M1}Kabc
{M2}Kaby
{M3}Kabc
{M1}Kabc.
{M3}KAbc
B
A
{M2}Kabc
Transcribed Image Text:Chat Server (S) {M2}Kabc {M1}Kabc {M3}Kabc {M1}Kabc {M2}Kaby {M3}Kabc {M1}Kabc. {M3}KAbc B A {M2}Kabc
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY