Question: We describe a basic key exchange protocol using private key cryptography upon which more sophisticated protocols for key exchange are based. Encryption within the protocol

We describe a basic key exchange protocol using private key cryptography upon which more sophisticated protocols for key exchange are based. Encryption within the protocol is done using a private key cryptosystem (such as AES) that is considered secure. The protocol involves three parties, Alice and Bob, who wish to exchange a key, and a trusted third party Cathy. Assume that Alice has a secret key kAlice that only she and Cathy know, and Bob has a secret key kBob which only he and Cathy know. The protocol has three steps:
(i) Alice sends the trusted third party Cathy the message "request a shared key with Bob" encrypted using Alice's key kAlice.
(ii) Cathy sends back to Alice a key kAlice,Bob, which she generates, encrypted using the key kAlice, followed by this same key kAlice,Bob, encrypted using Bob's key, kBob.
(iii) Alice sends to Bob the key kAlice,Bob encrypted using kBob, known only to Bob and to Cathy.
Explain why this protocol allows Alice and Bob to share the secret key kAlice,Bob, known only to them and to Cathy.

Step by Step Solution

3.47 Rating (163 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Cathy knows the shared key k AliceBob but because she transmitted it to Alice encry... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

923-M-C-M-S (1740).docx

120 KBs Word File

Students Have Also Explored These Related Statistics Questions!