$30
Homework 3
1. (10 pts) Consider the following mutual authentication protocol. Give two different attacks Trudy can convince Bob she is Alice.
2. (10 pts) Design a secure two-message authentication protocol that provides mutual-authentication and establishes a session key K. Assume that Alice and Bob know each other’s public keys beforehand.
3. (10 pts) SSL and IPSec are both designed to provide security over the network.
a. What are the significant similarities between the two protocols?
b. What are the significant differences between the two protocols?
c. For SSL, what protocol does it use to establish security contexts (e.g., keys and algorithms) between two parties? How about IPSec?
d. What will a packet look like if you (IP address A) send a packet to another machine (IP address B) with AH at tunnel mode?
4. (10 pts) Consider the Kerberos interaction discussed in this chapter.
a. Why is the ticket to Bob encrypted with KB?
b. Why is “Alice” included in the (encrypted) ticket to Bob?
c. In the REPLY message, why is the ticket to Bob encrypted with the key SA?
d. Why is the ticket to Bob sent to Alice (who must then forward it to Bob) instead of being sent directly to Bob?
5. (10 pts) Consider the Kerberized login discussed in this chapter.
a. What is a TGT and what is its purpose?
b. Why is the TGT sent to Alice instead of being stored on the KDC?
c. Why is the TGT encrypted with KKDC?
d. Why is the TGT encrypted with KA when it is sent from the KDC to Alice’s computer?
Additional Questions:
5.33: (6 pts for part a) (2 bonus points for part b)
5.42: (10 pts)
(http://www.cs.sjsu.edu/~stamp/infosec/files/)
5.43: (12 pts)
5.48: (6 pts)
5.49: (8 pts)
10.1. (8 pts)