Question: 1. Applied Cryptography. Alice and Bob, two CS 4264 alumni, have been stranded on a desert island for several weeks. Alas, these one-time partners are

1. Applied Cryptography. Alice and Bob, two CS 4264 alumni, have been stranded on a desert island for several weeks. Alas, these one-time partners are still fighting over whether Bob really pulled his weight on Project 4, and so they've decided to separate themselves until they work out their differences. Alice has built a hut on the beach, while Bob lives high in the forest branches. They plan to communicate silently by tossing coconuts over the treeline. Compounding Alice and Bob's misfortune, on this island there also lives an intelligent, lit erate, and man-eating panther named Mallory. The pair can cooperate to warn each other when they see the animal approaching each others' shelters, but they fear that Mallory will intercept or tamper with their messages in order to make them her next meal. (a) Fortunately, Alice and Bob each have an RSA key pair, and each knows the other's pub lic key. Design two protocols, such that Alice and Bob can authenticate each other and agree on a shared secret for use in further communication, one protocol that provides forward secrecy and one that does not (b) After arriving at a shared secret, Alice and Bob plan to use symmetric cryptography to protect their messages, but they disagree about how to apply it. Alice believes it is best to encrypt their plaintext then adda first then encrypt. Explain whose approach is safer, (c) Alice and Bob's protocol allows them to communicate securely, but it sl leaks to Mallory the fact that they are communicating. Describe an approach that the two could use to obscure this
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
