Ask a question to Desklib · AI bot

Ask NowBETA

Secure Key Distribution Method for Advanced Network Security - Question 1 - Phase 4

Added on -2019-09-25

This article discusses the key distribution issues in symmetric encryption methods and suggests a secure key distribution method using the Diffie-Hellman key exchange algorithm. It explains the steps involved in generating the global public parameters, private and public keys, and deriving the shared secret. The article also highlights the pros and cons of the suggested method and provides insights into RSA and DSA algorithms.
| 2 pages
| 645 words
| 256 views

Trusted by 2+ million users,
1000+ happy students everyday

Advanced Network Security - Question 1 - Phase 4A.Created summary of individual messages and zipped into folderB.Signed summary of individual message and zipped into folderC.Key Distribution issues : Traditionally, in symmetric encryption method, it is necessaryfor either of the signer or user of the ciphered text has to create and share the key overany medium to the other user which is using it to verify the signed text. Security of thekey is highly dependent on the medium through which one share the key to other. Whilethe key is in transit, there might be chances where a key is being stolen or copied by thethird party. That third party can use the key unethically to decrypt the importantciphertext.As per suggested methods sharing key either through Email signature or post itto moodle forum has changes of unauthenticated access to third party. Sharing publickey through email might face some issues where an active attacker modifying the emailwhile in transit, and replace the shared public key with his own public key. On the otherhand sharing on online portal also might have similar issues where MIM attack with alterthe shared key.D. Secure Key distribution Method :As we have used two RSA algorithms in the given assignment where asymmetricencryption to encrypt the message and digital signature to sign the message. Both areusing same mathematical operation. On other hand there more secure Diffie-Hellmankey exchange algorithm. In RSA algorithm generating a random symmetric key andencrypting it with the recipient’s public key. On other hand DH method uses a one roundtrip between the sender and receiver where recipient of the message sends his half DHPublic key, sender computes the exchange algorithm and also obtain the key. Senderencrypts the message and sends the whole to recipient. With all shared information,recipient compute the key and decrypt the message.Generate the Diffie-Hellman global public parameters, saving them in the file dh.pem:$openssl genpkey -genparam -algorithm DH -out dh.pemEach user now uses the public parameters to generate their own private and public key,saving them in the file dhk1.pem (for user 1) and dhk2.pem (for user 2):$openssl genpkey -paramfile dh.pem -out dhk1.pem$openssl genpkey -paramfile dh.pem -out dhk2.pem

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this