One local area network vendor provides a key distribution facility, as illustrated in Figure 14.18.
a. Describe the scheme.
b. Compare this scheme to that of Figure 14.3. What are the pros
and cons?
Fig 14.18:
Fig 14.3:
a.
A sends a connection request to B. This connection request includes an event marker or nonce (Na) encrypted with the key that A shares with the KDC.
Now, if B is to accept the connection, it sends a request to the KDC for a session key. This connection request consists of A's encrypted nonce along with a nonce generated by B (Nb). Further, the connection request is encrypted with the key that B shares with the KDC.
The KDC returns two encrypted blocks to B. One encrypted block is directly targeted for B and includes the session key, A's identifier, and B's nonce. The second encrypted block is intended for A, which is first passed from the KDC to B, and then to A. Both, A and B, have securely obtained the session key and, due to the nonces, are assured of authenticity of each other.
b.
The proposed scheme seems to provide the same level of security as that depicted in Figure 14.3. The main advantage of the proposed scheme is that if due to some or other reasons B rejects the connection from A, in that case the overhead of an interaction with the KDC can be avoided.
One local area network vendor provides a key distribution facility, as illustrated in Figure 14.18. a....
There is a key distribution scheme as illustrated in the first
Figure.
a. Describe the scheme in the first Figure.
b. Compare these two schemes in two figures. What are the pros
and cons of each other?
We were unable to transcribe this imageKey Distribution Center (KD 1 IDIDg l Ni Key distribution steps LK, IDAI) 3) Ek Responder Initiator (4) E(K, N2) (5) E(K,, fN2)) Authentication steps
Key Distribution Center (KD 1 IDIDg l Ni Key distribution steps LK,...