Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Design of methods

Title: Design and analyze communication protocol for Forum system-Two-level hierarchy of symmetric encryption Protocol

As per the requirement for the private online forum system, a communication protocol has been created. The users will be able to create groups, discuss online and a lot more while protecting their privacy as well. The design is secure and lightweight scheme which is composed of the important security attributes along with the resistance of various attacks. The design ensures the anonymity of the users, verification of passwords is also included in the design along with the no password-verifier in the HA to maintain secret keys. Here, the design includes public and private keys in order to secure the channel. In the design, a two-level hierarchy of symmetric encryption protocol has been used in the design. This approach has been used in the design of the communication system. In this approach, the design would utilize trusted keys distribution. Here, each of the actors who take part in the network would be sharing secret keys which is also known as the secret keys within the distribution center. The distribution center would be allowing the mode of generation of keys which would be used by the actors of the digital communication protocol while exchanging messages which are also known as session keys. This would help in the security of the messages which are being exchanged over the digital system.

Moreover, enhanced attributes have been included in the Two-level hierarchy of symmetric encryption Protocol in order to maintain the anonymity of the design. With this, the data which would be exchanged over this design will remain encrypted in the encrypted channel. As per the proposed design, the user will have to go through a series of phases in order to create their account in the forum system. The user has to first go through the registration phase where they have to register themselves to the forum system through the secure communication channel. After this phase the user will have their account created.          

The data items that are used in the design are defined in the following,

String: It is basically considered to be a type of data and this has been implemented in the design as an array data structure of bytes which is responsible for storing a series of elements, mainly characters that are encoded.

Syntax: This is referred to the format or the structure of the data and signal levels. It is responsible for determining the ways in which data could be read in the form of bits.  

Semantics: It is the interpretation of each section of bits or fields. It could specify the definition in which action to be taken in particular pattern.  

Timing: The timing refers to when the data should be sent and the speed of the data to be sent.

In the Two-level hierarchy of symmetric encryption Protocol, the message is the most important asset as a part of the communication system. It could be referred to the data or a packet of information which is transferred from the source to the destination in order to restore the communication. The message in this symmetric encryption Protocol, of the communication system could be in various forms for example texts files.

Data items used

 Communication system of the design

Figure 1: Communication system of the design

The messages have some components which help in the transmission of the messages. These are stated in the following,

Sender: In the forum, there has to be a source who will be acting as the media from whom the messages will be sourced.

Receiver: This could be termed as the destination to which the messages are finally arrived through a media of channel.

Channel: The media of channel which has been mentioned in the above is nothing but the transmission medium which acts as the bridge between the communication.  

 

Suppose an actor A wishes to establish a connection with B over the communication platform and would require one time session key. a set up for message exchange between A to B through the communication forum where, A would have master key Ka received by the KDC and B would have Kb with KDC. A had initiated the communication by generating nonce and also sends its identifier to B in the form of plain text. A has initiated the authentication exchange by generating nonce, the nonce is stated to be as IDA || IDB || N1. There would be a unique identifier for each message identification or the nonce which is referred to as N1. In the session, there is a onetime session key which is known as Ks. Also, there is the unique identifier for A in the session which is known as IDA moreover, the last two items would be encrypted with Kb which is to be sent in order to identify the connection between A and B. A will receive the nonce in encrypted form along with session key which is E(Ka. [K, || IDA || IDg || N?]) || E(K? [K¸ || IDA]). Now, A would store the session key and forward it to B which is known as E(Kb,[Ks || IDA]). From the figure above, it could be observed that, Message of B also includes the block encrypted along with secret key shared by B which is known as E(Kb,[Ks || IDA]). At this point, a session key has been received by A and B which leads them to begin their protected exchange. But there are two more steps which are needed, B would send a nonce N2 to A and A would use Ks to respond with f(N2) where, f is the function performing transformation on N2.    

The Two-level hierarchy of symmetric encryption Protocol includes public and private keys in order to secure the channel. In the protocol, a two-level hierarchy of symmetric encryption protocol has been used in the design. There have been certain tests which are overcome by the Two-level hierarchy of symmetric encryption Protocol as in the proposed scheme has found to be maintaining the anonymity of the user and reveals no information of them. This approach has been used in the design of the communication system. In this approach, the design would utilize trusted keys distribution. The distribution center would be allowing the mode of generation of keys which would be used by the actors of the digital communication protocol while exchanging messages which are also known as session keys. The symmetric encryption Protocol does not consist of the values which are user specific in the request which would be made by the user. It is so due to the generation of random number which is made in every login request which makes the login request have a lot of or different value of the message request. This would help in the security as well as anonymity of the messages sent by the user, which indirectly means that the forum is capable of making the user anonymous over the digital system as well. In the Two-level hierarchy of symmetric encryption Protocol, no external threat or third party will be enabled in deriving specific number or values of the login requests which ensures the anonymity of the protocol.     

The authentication capability of the Two-level hierarchy of symmetric encryption Protocol has been verified and it has been made through certain tests. The authentication has been performed between the user and the home agent as well as that of the foreign agent. In the proposed solution, authentication has been achieved with the help of decryption and verification of the authentication parameters that will be present in the messages. In order to authenticate the users, the Two-level hierarchy of symmetric encryption Protocol would necessarily require validation of the user in order to communicate with the forum. No adversary will be able to calculate the correct keys without the knowledge of other attributes. This results as restricting the unauthorized access by validating the user password locally.

Here, the Two-level hierarchy of symmetric encryption Protocol has been efficient authentication as per the tests. Suppose there has been a set up for message exchange between A to B through the communication forum where, A has initiated the authentication exchange by generating nonce and also sends its identifier to B in the form of plain text. A will receive the nonce in encrypted form along with session key. B would notify the need of session key to the distribution center which includes its identifier and nonce as well. This in turn would return the nonce to B which also includes the encrypted message session key. Message of B also includes the block encrypted along with secret key shared by B. This block would determine issue to credentials to A, also, the block would specify intended recipient, an expiration period of the credentials and nonce received from A. the distribution center passes the nonce to A the nonce of B and block encrypted with secret keys which is shared by B with the distribution center. Then the distribution center would serve block as a ticket pass for A for subsequent authentication. Then the block would also verify if B has received message from A's initial ID and provides a session key with time limit on the use. A would transmit the ticket to B and B would get the secret key by which B could decrypt the message and recover the nonce.       

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Design And Analyze Communication Protocol For Forum System - Two-level Hierarchy Of Symmetric Encryption Essay.. Retrieved from https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/design-and-analyze-communication-protocol-for-forum-system-file-A1D8F9B.html.

"Design And Analyze Communication Protocol For Forum System - Two-level Hierarchy Of Symmetric Encryption Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/design-and-analyze-communication-protocol-for-forum-system-file-A1D8F9B.html.

My Assignment Help (2022) Design And Analyze Communication Protocol For Forum System - Two-level Hierarchy Of Symmetric Encryption Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/design-and-analyze-communication-protocol-for-forum-system-file-A1D8F9B.html
[Accessed 14 July 2024].

My Assignment Help. 'Design And Analyze Communication Protocol For Forum System - Two-level Hierarchy Of Symmetric Encryption Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/design-and-analyze-communication-protocol-for-forum-system-file-A1D8F9B.html> accessed 14 July 2024.

My Assignment Help. Design And Analyze Communication Protocol For Forum System - Two-level Hierarchy Of Symmetric Encryption Essay. [Internet]. My Assignment Help. 2022 [cited 14 July 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/design-and-analyze-communication-protocol-for-forum-system-file-A1D8F9B.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close