subject

Assume that A and B share a long-term 256-bit AES key K. Our key exchange protocol has two goals: (1) let A and B agree on a new fresh session key Ks to be used for a current session, and (2) perform mutual authentication. Nb is a nonce and Ks is a new session key generated by B. Assume that Ks and Nb are of the same bit-length and both are always chosen at random. EK(.) denotes AES encryption of everything inside () with key K. HMACK(.) denotes SHA2-based HMAC of everything inside () using key K. Protocol:
1.A −→ B: EK(A, B, "Hello")
2.B −→ A: EK(Ks, Nb, HMACK(A, B, "Hello"))
3.A −→ B: HMACK(Ks, Nb, 1)
What (if any) are the vulnerabilities of this protocol? If there are any, how can you fix them? For fix, you need to show modification of the protocol. Limit each answer (vulnerabilities and their fixes separately) to 10 lines

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 17:30
How are natural numbers, whole numbers, integers, and rational numbers related
Answers: 3
question
Computers and Technology, 22.06.2019 01:00
Ap practice - performance task response the ap create performance task asks you to write about an abstraction that you developed and wrote into your code. most of the time that means identifying a function or procedure you wrote to "manage complexity" in your program. here is the actual prompt from the create performance task: 2d. capture and paste a program code segment that contains an abstraction you developed individually on your own (marked with a rectangle). this abstraction must integrate mathematical and logical concepts. explain how your abstraction manage the complexity of your program. (must not exceed 200 words) below is a segment of code from an "under the sea" program with a rectangle drawn around a portion of the code identifying an abstraction. imagine that you wrote this and are composing an ap response about how this abstraction manages complexity. (note: ignore the requirement that the abstraction integrate "mathematical and logical concepts" for this practice response. just write about managing complexity). explain how the abstraction marked with the rectangle in the code above manage complexity of this program. write your response here submit
Answers: 2
question
Computers and Technology, 22.06.2019 23:30
Which text format is this, "the text is transcribed exactly as it sounds and includes all the utterances of the speakers. "?
Answers: 2
question
Computers and Technology, 23.06.2019 12:00
If you're using an existing powerpoint presentation that will receive new slides based on a word outline, select the a. slide that will appear after the new slides. b. first slide in the presentation. c. slide that will appear before the new slides. d. last slide in the presentation.
Answers: 2
You know the right answer?
Assume that A and B share a long-term 256-bit AES key K. Our key exchange protocol has two goals: (1...
Questions
question
Spanish, 25.07.2019 06:30
question
Mathematics, 25.07.2019 06:40
Questions on the website: 13722361