subject

Assume that A and B share a long-term 256-bit AES key K. Our key exchange protocol has two goals: (1) let A and B agree on a new fresh session key Ks to be used for a current session, and (2) perform mutual authentication. Nb is a nonce and Ks is a new session key generated by B. Assume that Ks and Nb are of the same bit-length and both are always chosen at random. EK(.) denotes AES encryption of everything inside () with key K. HMACK(.) denotes SHA2-based HMAC of everything inside () using key K. Protocol:
1.A βˆ’β†’ B: EK(A, B, "Hello")
2.B βˆ’β†’ A: EK(Ks, Nb, HMACK(A, B, "Hello"))
3.A βˆ’β†’ B: HMACK(Ks, Nb, 1)
What (if any) are the vulnerabilities of this protocol? If there are any, how can you fix them? For fix, you need to show modification of the protocol. Limit each answer (vulnerabilities and their fixes separately) to 10 lines

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 01:00
Me if you do then you get 10 points and brainliest
Answers: 1
question
Computers and Technology, 24.06.2019 02:50
Be sure to answer all parts. synthesize the following compound from benzene. a. b. c. d. e. f. reaction [1] conditions: a b c d e f reaction [1] product: draw structure reaction [2] conditions: a b c d e f reaction [2] product: draw structure reaction [3] conditions: a b c d e f reaction [3] product:
Answers: 3
question
Computers and Technology, 25.06.2019 08:00
True or false: a power supply is an electrical transformer that regulates the electricity used by the computer.
Answers: 1
question
Computers and Technology, 25.06.2019 08:20
With technology, information is sent to users based on their previous inquiries, interests, or specifications.
Answers: 2
You know the right answer?
Assume that A and B share a long-term 256-bit AES key K. Our key exchange protocol has two goals: (1...
Questions
question
Mathematics, 24.08.2019 19:10
question
Geography, 24.08.2019 19:10
question
Mathematics, 24.08.2019 19:10