
Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The requirements and details for assignment 4, which involves setting up a network with at least three computers, one acting as a key distribution center (kdc). Users register with kdc to generate master keys, and session keys are generated by kdc for secure communication between users. The process of session key generation, distribution, and log updating.
Typology: Exercises
1 / 1
This page cannot be seen from the preview
Don't miss anything!
This assignment is the sequel of Assignment 3
Requirements:- Minimum 3 computers to be in the network, one being KDC. When a user registers with KDC, a master key is generated, one copy of it being with KDC and other with the user (Assume that user registration is already done and suppose a hard coded Master Key for both users. No need to repeat assignment 3 all over again). Now when a user wants to communicate to another user in the network, the session key “kk” needs to be generated by KDC. This is an 8 bit long key with 5 bits of a new nonce concatenated with 3 bits of salt that starts from 000 for the first communication, 001 for the second and so on.
Encrypted communication between the two users takes place using the session key once the session key reaches both of them through KDC. (session key distribution should follow the exact 3 steps given in Lecture 6, slide 33).
For each session, KDC’s record log gets updated since salt has to be incremented for the next communication between the same users.
The record log contains the following:-
The counter in decimal indicating the salt value last used.
The time when the request for kk was initiated from the starter of the communication.
ID’s of both the parties involved in the communication and a tag (‘’Starter’’) indicating which of the two, was the initiator.
Assignment’s Details:-
Wednesday, 5th^ Jan 2011. Since there is ample time in the deadline, no delay requests shall be entertained. On that day, your regular class will NOT take place. Groups of 2 or 3 (Each person will have to justify his/her contribution). In the demo, you will need to do show the values of nonces, salts, IP and MACs, keys, timings and all other possible values so that they get verified at each step. Platform independent (JAVA is preferred).