Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Authentication Protocol between Alice and Bob

Description

Description

You will describe an authentication protocol between Alice (the entity identifying and authenticating itself) and Bob (the verifier). The protocol is required to be cryptographic and can be based on a combination of symmetric and asymmetric cryptography. Assume that Alice and Bob do not share a pre-shared symmetric key.

You can assume that either Alice or Bob has a public key certificate that is verifiable by the other party. Describe each step of the protocol, what actions Alice and Bob must accomplish, and the messages Alice and Bob need to send to each other.

Please refer the attached assignment document for the detailed instructions. Please respect the maximum page limit of one page. It is a short assignment. 

Learning outcomes being met through this assessment

  • Apply cryptographic primitives to an identification and authentication protocol between two entities.

Steps to complete the assignment

  1. Read the description of the assignment in this document. 
  2. Describe the cryptographic authentication protocol between Alice and Bob
    1. Clearly identify the operations that Alice and Bob must execute and the messages that they need to send between each other. Assign a number to each step of the protocol.
  3. Upload your Word document to myCourses. 

support
close