Three people (Anders, Anna, and Lena) want to communicate safely. They want to use symmetric encryption and see the need to exchange new keys daily. Dedicated keys are used between all communicating parties, one key to communicate between Anders and Anna, and another key between Anna and Lena, so three symmetric keys are needed. Asymmetric encryption is used for the distribution of symmetric keys. Diffie-Hellman key exchange is considered risky due to the man-in-the-middle threat, so some of the communicating parties need to propose the symmetric key to use for a specific day and share it using asymmetric encryption. The proposed symmetric key should, of course, only be available for the communicating peers, and it must be possible to verify the originator suggesting the key. Further, X.509 certificates are used for the distribution of public keys. Your task is to present a solution that meets the security requirements by proposing what algorithms to use to provide the security needed considering today’s state-of-the-art technologies, the message exchange required, and list what key lengths you see as feasible

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%

Three people (Anders, Anna, and Lena) want to communicate safely. They want to use symmetric encryption and

see the need to exchange new keys daily. Dedicated keys are used between all communicating parties, one key to

communicate between Anders and Anna, and another key between Anna and Lena, so three symmetric keys are needed.

Asymmetric encryption is used for the distribution of symmetric keys. Diffie-Hellman key exchange is considered risky

due to the man-in-the-middle threat, so some of the communicating parties need to propose the symmetric key to use

for a specific day and share it using asymmetric encryption. The proposed symmetric key should, of course, only be

available for the communicating peers, and it must be possible to verify the originator suggesting the key. Further,

X.509 certificates are used for the distribution of public keys. Your task is to present a solution that meets the security

requirements by proposing what algorithms to use to provide the security needed considering today’s state-of-the-art

technologies, the message exchange required, and list what key lengths you see as feasible.

Expert Solution
steps

Step by step

Solved in 2 steps with 5 images

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education