Implementation of Session Key Exchange through KDC Part 1-Computer Security-Assignment, Exercises for Computer Security. Guru Jambheshwar University of Science and Technology
parni
parni

Implementation of Session Key Exchange through KDC Part 1-Computer Security-Assignment, Exercises for Computer Security. Guru Jambheshwar University of Science and Technology

PDF (245 KB)
1 page
1000+Number of visits
Description
This course teaches the key concepts of computer and network security. The course is divided in two parts. The first part covers the key cryptology concepts and protocols while the second half is about the advance topics...
20 points
Download points needed to download
this document
Download the document
Preview1 page / 1
Download the document

Implementation of Session Key Exchange through KDC

Requirements:-

 Minimum 3 computers to be in the network, one being KDC.

 When a user registers with KDC, a master key is generated, one copy of it being with KDC

and other with the user.

 The registration process is based on the algorithm specified below.

 The master key generation is the critical part and is your imagination.

You need to devise your own algorithm for it and it carries heavy weight

in the marking.

User Registration Algorithm:-

 Based on three way handshake

 Step 1: User -> KDC:

1. User’s ID (IP address and/or MAC address)

2. User’s Nonce (not hard coded)

3. A time stamp value (to be expired as it reaches KDC)

 Step 2: KDC - > User:

1. User’s Nonce (the same as received)

2. KDC’s Nonce

3. A new time stamp

 Step 3: User - > KDC:

1. KDC’s Nonce (as received by the user)

2. A new time stamp

Assignment’s Details: -

 Wednesday, 15th Dec 2010.

 On that day, your regular class will NOT take place.

 Instead, each CR will reserve a lab for assignment demo and viva on the same day at any time

when the lab is free.

 No make-up demos will be done. If you want to get your assignment graded, you have to be

present at the demo time with the entire group, no matter what!

 Groups of 2 or 3 (Each person will have to justify his/her contribution).

 Platform independent (JAVA is preferred)

docsity.com

comments (0)
no comments were posted
be the one to write the first!
Download the document