Question: For the Protocols 1, 2, 3, and 4, given below, determine which of the following five security services are being implemented and which are not
For the Protocols 1, 2, 3, and 4, given below, determine which of the following five security services are being implemented and which are not implemented. In each case, explain why.
Services:
C – Confidentiality,
AS – Authentication of the Sender,
AR – Authentication of the Receiver,
NS – Non-repudiation of the Sender, and
NR – Non-repudiation of the Receive
Protocol 1
1. A sends to B
A, E(PUB, M), h(M || A || B), B
2. B sends to A
B, h(M || B || A), A
Protocol 2
1. A sends to B
A, E(PUB, M), E(PRA, h(M || A)), B
2. B sends to A
B, E(PUA, h(M || B)), A
Protocol 3
1. A sends to B
A, E(PUB, K), E(K, M), E(PRA, M || A), B
2. B sends to A
B, h(K || M || B), A
Protocol 4
1. A sends to B
A, M, E(KAB, h(M || A)), B
2. B sends to A
B, h(M || B), A
Notation:
X represents a unique name of user X, where X=A or B
M means a message
V || W means V concatenated with W
KAB means a secret key shared in advance by A and B
K means a session key, generated at random as a part of a given protocol
E(PUY, Z) means Z encrypted using a public key of Y
E(PRY, Z) means Z encrypted using a private key of Y
E(K, Z) means Z encrypted using a secret key K
Step by Step Solution
3.45 Rating (152 Votes )
There are 3 Steps involved in it
protocol 1 are implementing 1 of the 5 security services confidentiality is not being implemented for the transfer that is takeing place becuase it do... View full answer
Get step-by-step solutions from verified subject matter experts
