Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Assignment 4: Key Distribution System with KDC, Exercises of Computer Security

The requirements and details for assignment 4, which involves setting up a network with at least three computers, one acting as a key distribution center (kdc). Users register with kdc to generate master keys, and session keys are generated by kdc for secure communication between users. The process of session key generation, distribution, and log updating.

Typology: Exercises

2011/2012

Uploaded on 08/08/2012

parni
parni 🇮🇳

4.1

(14)

102 documents

1 / 1

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Assignment 4
This assignment is the sequel of Assignment 3
Requirements:-
Minimum 3 computers to be in the network, one being KDC.
When a user registers with KDC, a master key is generated, one copy of it being with KDC
and other with the user (Assume that user registration is already done and suppose a hard
coded Master Key for both users. No need to repeat assignment 3 all over again).
Now when a user wants to communicate to another user in the network, the session key
“kk” needs to be generated by KDC. This is an 8 bit long key with 5 bits of a new nonce
concatenated with 3 bits of salt that starts from 000 for the first communication, 001 for the
second and so on.
Encrypted communication between the two users takes place using the session key once the
session key reaches both of them through KDC. (session key distribution should follow the
exact 3 steps given in Lecture 6, slide 33).
For each session, KDC’s record log gets updated since salt has to be incremented for the
next communication between the same users.
The record log contains the following:-
The counter in decimal indicating the salt value last used.
The time when the request for kk was initiated from the starter of the
communication.
ID’s of both the parties involved in the communication and a tag
(‘’Starter’’) indicating which of the two, was the initiator.
Assignment’s Details:-
Wednesday, 5th Jan 2011. Since there is ample time in the deadline, no delay requests shall be
entertained.
On that day, your regular class will NOT take place.
Groups of 2 or 3 (Each person will have to justify his/her contribution).
In the demo, you will need to do show the values of nonces, salts, IP and MACs, keys, timings
and all other possible values so that they get verified at each step.
Platform independent (JAVA is preferred).
docsity.com

Partial preview of the text

Download Assignment 4: Key Distribution System with KDC and more Exercises Computer Security in PDF only on Docsity!

Assignment 4

This assignment is the sequel of Assignment 3

Requirements:-  Minimum 3 computers to be in the network, one being KDC.  When a user registers with KDC, a master key is generated, one copy of it being with KDC and other with the user (Assume that user registration is already done and suppose a hard coded Master Key for both users. No need to repeat assignment 3 all over again).  Now when a user wants to communicate to another user in the network, the session key “kk” needs to be generated by KDC. This is an 8 bit long key with 5 bits of a new nonce concatenated with 3 bits of salt that starts from 000 for the first communication, 001 for the second and so on.

 Encrypted communication between the two users takes place using the session key once the session key reaches both of them through KDC. (session key distribution should follow the exact 3 steps given in Lecture 6, slide 33).

 For each session, KDC’s record log gets updated since salt has to be incremented for the next communication between the same users.

 The record log contains the following:-

 The counter in decimal indicating the salt value last used.

 The time when the request for kk was initiated from the starter of the communication.

 ID’s of both the parties involved in the communication and a tag (‘’Starter’’) indicating which of the two, was the initiator.

Assignment’s Details:-

 Wednesday, 5th^ Jan 2011. Since there is ample time in the deadline, no delay requests shall be entertained.  On that day, your regular class will NOT take place.  Groups of 2 or 3 (Each person will have to justify his/her contribution).  In the demo, you will need to do show the values of nonces, salts, IP and MACs, keys, timings and all other possible values so that they get verified at each step.  Platform independent (JAVA is preferred).

docsity.com