Computers and Technology

Assume that A and B share a long-term 256-bit AES key K. Our key exchange protocol has two goals: (1) let A and B agree on a new fresh session key Ks to be used for a current session, and (2) perform mutual authentication. Nb is a nonce and Ks is a new session key generated by B. Assume that Ks and Nb are of the same bit-length and both are always chosen at random. EK(.) denotes AES encryption of everything inside () with key K. HMACK(.) denotes SHA2-based HMAC of everything inside () using key K. Protocol:
1.A βˆ’β†’ B: EK(A, B, "Hello")
2.B βˆ’β†’ A: EK(Ks, Nb, HMACK(A, B, "Hello"))
3.A βˆ’β†’ B: HMACK(Ks, Nb, 1)
What (if any) are the vulnerabilities of this protocol? If there are any, how can you fix them? For fix, you need to show modification of the protocol. Limit each answer (vulnerabilities and their fixes separately) to 10 lines

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 23:00, SuperWoman9172
What is one of the main problems that can occur when implementing a large number of new systems within an organization?
Answers: 1
image
Computers and Technology, 22.06.2019 01:40, Serenitybella
When the pc version of the spreadsheet program became available, the ibm pc quickly became the top-selling personal computer?
Answers: 3
image
Computers and Technology, 23.06.2019 08:30, sofigaviria05
All of these are true about using adhesive except: a. dissimilar materials can be joined. b. mixing tips are product and material specific. c. a specific application gun may be required. d. two-part adhesives are dispensed using two mixing tips
Answers: 3
image
Computers and Technology, 23.06.2019 14:30, ladawnrowles005
The option enables you to modify a slide element in most presentation applications.
Answers: 2
Do you know the correct answer?
Assume that A and B share a long-term 256-bit AES key K. Our key exchange protocol has two goals: (1...

Questions in other subjects: