UP TO 15 % DISCOUNT

Get Your Assignment Completed At Lower Prices

Plagiarism Free Solutions
100% Original Work
24*7 Online Assistance
Native PhD Experts
Hire a Writer Now
CSCI368 Network Security Assignment, UOW, Singapore: In A Mobile Roaming System, There Are Three Entities: A Mobile User U, Its Home Server H
University University of Wollongong (UOW)
Subject CSCI368 Network Security Assignment
Posted on: 13th Mar 2024

CSCI368 Network Security Assignment, UOW, Singapore: In A Mobile Roaming System, There Are Three Entities: A Mobile User U, Its Home Server H

5. In a mobile roaming system, there are three entities: a mobile user U, its home server H, and a foreign server V. The mobile user U, who is subscribed to the home server H, is currently in a foreign network administered by the foreign server V. There is a direct link between U and V, and another direct link between V and H. However, there is no direct link between U and H. In order to obtain the services provided by V, U must be authenticated by V (with the help from H).

Suppose that the mobile user U shares a symmetric key KUH with its home server H. The home server H and the foreign server V also have public keys PKH and PKV that are certified by a trusted CA (H and V both have certificates). You task is to design a secure authentication and key establishment protocol which can satisfy the following security requirements.

a. User authentication: the foreign server must be sure that U is a legitimate
subscriber of H.

Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers

b. Server authentication: the user must be sure that V is indeed the real foreign server. (In the view of the user, the foreign server is V)

c. Secure key agreement: U and V will establish a fresh session key at the end of the protocol. The session key can only be known by U and V (i.e., H cannot know the session key).

d. Anonymity & unlinkability: Besides the user and the home server, no one
including the foreign server can tell the real identity of the user (i.e., the foreign server V only knows that U is a valid user of H, but does not know Us real identity) or link two sessions belonging to the same user.

You can assume that all the entities (H, V, and U) can perform public key operations. However, only H and V have certified public keys.

Describe each step of your protocol clearly and then provide justifications for each of the security requirements given above.

Hire a Professional Essay & Assignment Writer for completing your Academic Assessments

Get Help By Expert

Struggling with your CSCI368 Network Security Assignment? Let our assignment writing service and Do My Assignment Singapore support you. Singaporean students can ease their burden by paying for expert assistance. Trust us to deliver quality solutions tailored to your needs, ensuring academic excellence without the stress.

Categories:-
Tags:-
Answer
Recent Solved Questions
No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total
    Free

New Special Offer

Get 30% Off

UP TO 15 % DISCOUNT

Get Your Assignment Completed At Lower Prices

Plagiarism Free Solutions
100% Original Work
24*7 Online Assistance
Native PhD Experts
Hire a Writer Now
My Assignment Help SG Services
My Assignment Help SG

Rated 4.9/5 Based on 22945 Singaporean Students