Question: Based on the info given below can someone create a drawn diagram with clear labelling of the key protocol Legend: A: Entity A B: Entity
Based on the info given below can someone create a drawn diagram with clear labelling of the key protocol
Legend:
Protocol:
A requests to establish a secure chat session with B through S by sending its public key certificate Cert_A and a nonce N_a to S. CIA: Enc(CA<>, Cert_A) and Enc(CA<>, N_a) using AES Authentication algorithm: RSA Integrity algorithm: SHA256 Interaction: A S: {Enc(CA<>, Cert_A), Enc(CA<>, N_a)} S verifies the authenticity of A by checking the certificate and validates the nonce. S generates a new session key Kan for the communication between A and S, and sends Enc(Cert_A, Kan) and Enc(Kan, N_b) to A. CIA: Enc(Cert_A, Kan) and Enc(Kan, N_b) using AES Authentication algorithm: RSA Integrity algorithm: SHA256 Interaction: S A: {Enc(Cert_A, Kan), Enc(Kan, N_b)} A verifies the authenticity of S by checking the certificate and validates the nonce. A generates Kab as a shared secret key for communication with B. A sends Enc(Kab, Kan) and Sign_A(Enc(Kab, Kan)) to S. CIA: Enc(Kab, Kan) using AES and Sign_A using RSA Authentication algorithm: RSA Integrity algorithm: SHA256 Interaction: A S: {Enc(Kab, Kan), Sign_A(Enc(Kab, Kan))} S verifies the authenticity of A by checking the signature and validates the nonce. S sends Enc(Kab, Cert_B) and Sign_S(Enc(Kab, Cert_B)) to B. CIA: Enc(Kab, Cert_B) using AES and Sign_S using RSA Authentication algorithm: RSA Integrity algorithm: SHA256 Interaction: S B: {Enc(Kab, Cert_B), Sign_S(Enc(Kab, Cert_B))} B verifies the authenticity of S by checking the signature and sends Sign_B(Enc(Kab, Kan)) to A to establish the freshness of communication. CIA: Sign_B(Enc(Kab, Kan)) using RSA Authentication algorithm: RSA Integrity algorithm: SHA256 Interaction: B A: {Sign_B(Enc(Kab, Kan))} A verifies the freshness of communication by validating the signature. A sends Sign_A(H(Sign_B(Enc(Kab, Kan)))) to B to establish the freshness of communication. CIA: Sign_A(H(Sign_B(Enc(Kab, Kan)))) using RSA Authentication algorithm: RSA Integrity algorithm: SHA256 Interaction: A B: {Sign_A(H(Sign_B(Enc(Kab, Kan))))}
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
