Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
In the case of PKI (Public Key Infrastructure), A must first make a request to the Public Key Authority, which will then produce and transmit a message to B (E(PRauth[PUB] || Request || Time1]). Which key A should be used to understand the message is controversial.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- **Please use the provided information** Shared session key establishment using a Key Distribution Center (KDC). Using the following table, illustrate how Alice can initiate a secure session with Bob with the help of KDC. Here, KEKs are the long term key establishment keys used to transport the session keys across the network securely. Assume the encryption process to be as follows: Divide the key into two halves: LK and RK; Divide the plaintext into two halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT; where LC, RC, LT, and RT are each 4 bits; Plaintext and ciphertext are each 8 bits. For example, if plaintext=A7 (Hexa) and Key = 6D; then LC=6 ⊕ 7 = 0110 ⊕ 0111 = 0001 = 1 (Hexa); and RC = D ⊕ A = 1101 ⊕ 1010 = 0111 = 7 (Hexa); so Ciphertext = 17 (Hexa). To decryptt, it does the reverse operation: Given ciphertext of C=LC||RC, it finds plaintext T=LT||RT, by finding LT=RC ⊕ RK and RT = LC ⊕ LK. In the above example, LT = 7 ⊕D = 0111⊕1101=1010=A; RT=1 ⊕…arrow_forwardWhen it comes to PKI (Public Key Infrastructure) In order to get B's public key, A must first submit a request to the Public Key Authority, which will then generate and send a message to B (E(PRauth[PUB] || Request || Time1]). It's debatable which key A should use to interpret the message.arrow_forwardPlease refer to the following for the locking procedure: After an item has been unlocked, a higher-numbered item can no longer be locked. Any moment is appropriate to open locks. Only X-locks are used for this purpose. Demonstrate how the protocol does not ensure the serialisation of the data.arrow_forward
- 2. Recall the concept of Physically Unclonable Functions, which are an importantcomponent of hardware based security. Here is a simple scenario and simple protocol usingPUFs for authenticating a tag. In the protocol below, the Reader stores ALL possiblecombinations of Challenge-Response pairs for every tag it needs to authenticate. Duringauthentication, the Reader broadcasts the ID of the tag, and a greeting (Gn ). Every tag maysee this message, but only the one with the right ID will process the message. The right tagwith the ID in the message will then feed the greeting to its PUF and compute the responseSn. The response is then sent to the Reader. This should be clear from the Figure below. Forthe next round of authenticating the same Tag, the process repeats with a new Greeting(G n+1 ). Since the Reader has the responses, authentication is straightforward. Recall thatChallenges and Responses are typically 128 or 256 bit strings for RFIDs.From the protocol, and class, it should be…arrow_forwardQ9B- Context- Alice and Bob are members of the same Kerberos realm. They are both currently logged in with active session keys from the Kerberos KDC (key distribution centre). As per the Kerberos standard, the KDC has created unique session keys for both Alice and Bob, and then discarded them once received by the respective users. Alice wants to access a resource owned by Bob and contacts the KDC to request the necessary material. Answer the following questions about this scenario: Q- How can the KDC verify Alice’s identity after discarding her session key?arrow_forwardMessage source Source A Encryption. algorithm PU Cryptanalyst Y = ELPU, X] Scheme A f -PR₂ Destination B Decryption algorithm Key pair source Destination X = DIPRY PR Message source Source A X Encryption algorithm PR₁ PU Key pair source Cryptanalyst Y = E|PR X] Scheme B Which scheme provides authentication and which one provides confidentiality? why? PR₁ Destination B Decryption algorithm Destination X= DIPU Yarrow_forward
- q9c- Context- Alice and Bob are members of the same Kerberos realm. They are both currently logged in with active session keys from the Kerberos KDC (key distribution centre). As per the Kerberos standard, the KDC has created unique session keys for both Alice and Bob, and then discarded them once received by the respective users. Alice wants to access a resource owned by Bob and contacts the KDC to request the necessary material. Answer the following questions about this scenario: Q- When Bob receives the service ticket from Alice, why should he trust her and what guarantees the service ticket is genuine and wasn’t forged by Alice?arrow_forwardTwo companies would like to communicate confidentially online. They also seek integrity and authenticity of the communication between each other. They require secret-key cryptography to achieve these goals. It is important for the companies that the ciphertexts exchanged are authentic and have not been altered in transit. Note that the communication between the companies comes in the form of short messages which would fit into one plaintext block of AES-128. Which of the following solutions is ideal for this scenario, where the companies share 2 secret keys, k1 which they can use for encryption and k2 which they can use for issuing and verifying MACs? Choose only 1 answer. O 1. T=HMACK2 (M) 2. C= AES-128-ENCk1(T) 3. Send C and T to the other company O 1.C-AES-128-ENCk1(M) 2. T-HMACK2(M) 3. Send C and T to the other company Any of the 3 solutions would suffice 1. C-AES-128-ENCk1(M) 2. T=HMACk2 (C) 3. Send C and T to the other companyarrow_forwardModes of operation such as CFB and CBC require the use of an initial variable (IV), which must be known by both the sender and receiver. Discuss the pros and cons of the following suggestions for selection of IVs Randomly generate each IV; Use a counter that is incremented after each message as the IV; Use the last ciphertext block of the previous message as the IVarrow_forward
- How can block cyphers and stream cyphers share their keys, and why should they be distinct?arrow_forwardExplain the specific differences between stream ciphers and block ciphers. Please provide three differences and an explanation for each.arrow_forwardEach of the following is a true/false statement about a tweakable block cipher (TBC). Place a checkmark next to each true statement. In the questions mentioning E', let E' be a random instance of a TBC and E'(T,X) be the result of using E' with tweak T and input X. Group of answer choices: (1)For TBC security both the current key and tweak in use must be kept secret from adversaries. (2)Each time a new tweak is given to a TBC, the TBC behaves like a new random permutation. (3)When a TBC is used once per tweak its outputs may be considered (4)A TBC is a prominent part of the design of OCB. (5)If X1 ≠ X2, then always E'(T,X1) ≠ E'(T,X2) (6)If T1 ≠ T2, then always E'(T1,X) ≠ E'(T2,X)arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education