logo

Secure Key Distribution Method

   

Added on  2019-09-25

2 Pages645 Words256 Views
 | 
 | 
 | 
Advanced Network Security - Question 1 - Phase 4A.Created summary of individual messages and zipped into folderB.Signed summary of individual message and zipped into folderC.Key Distribution issues : Traditionally, in symmetric encryption method, it is necessaryfor either of the signer or user of the ciphered text has to create and share the key overany medium to the other user which is using it to verify the signed text. Security of thekey is highly dependent on the medium through which one share the key to other. Whilethe key is in transit, there might be chances where a key is being stolen or copied by thethird party. That third party can use the key unethically to decrypt the importantciphertext.As per suggested methods sharing key either through Email signature or post itto moodle forum has changes of unauthenticated access to third party. Sharing publickey through email might face some issues where an active attacker modifying the emailwhile in transit, and replace the shared public key with his own public key. On the otherhand sharing on online portal also might have similar issues where MIM attack with alterthe shared key.D. Secure Key distribution Method :As we have used two RSA algorithms in the given assignment where asymmetricencryption to encrypt the message and digital signature to sign the message. Both areusing same mathematical operation. On other hand there more secure Diffie-Hellmankey exchange algorithm. In RSA algorithm generating a random symmetric key andencrypting it with the recipient’s public key. On other hand DH method uses a one roundtrip between the sender and receiver where recipient of the message sends his half DHPublic key, sender computes the exchange algorithm and also obtain the key. Senderencrypts the message and sends the whole to recipient. With all shared information,recipient compute the key and decrypt the message.Generate the Diffie-Hellman global public parameters, saving them in the file dh.pem:$openssl genpkey -genparam -algorithm DH -out dh.pemEach user now uses the public parameters to generate their own private and public key,saving them in the file dhk1.pem (for user 1) and dhk2.pem (for user 2):$openssl genpkey -paramfile dh.pem -out dhk1.pem$openssl genpkey -paramfile dh.pem -out dhk2.pem
Secure Key Distribution Method_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents