Question: Suppose Alice wants to visit the Web site activist.com using TOR-like service. This service uses two non-colluding proxy servers Proxy I and Proxy2. Alice first

Suppose Alice wants to visit the Web site activist.com using TOR-like service. This service uses two non-colluding proxy servers Proxy I and Proxy2. Alice first obtains the certificates (each containing a public key) for Proxy 1 and Proxy2 from some central server. Denote K+1( ), K+2( ), K-1( ), and K-2.( ) for the encryption/decryption with public and private RSA keys.
a. Using a timing diagram, provide a protocol (as simple as possible) that enables Alice to establish u shared session key S1 with Proxy 1. Denote SI (m) for encryption/decryption of data m with the shared key S1.
b. Using a timing diagram, provide a protocol (as simple as possible) that allows Alice to establish a shared session key S2 with Proxy2 without revealing her !P address to Proxy2.
c. Assume now that shared keys S1 and S2 are now established. Using a timing diagram, provide a protocol (as simple as possible and not using public- key cryptography) that allows Alice to request an html page from activist.com without revealing her IP address to Proxy2 and without revealing to ProxyI which site she is visiting. Your diagram should end with an HTTP request arriving at acrivist.com.

Step by Step Solution

3.38 Rating (151 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a b ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

899-CS-CN (731).docx

120 KBs Word File

Students Have Also Explored These Related Computer Network Questions!