help of a trusted server S. Both Alice and Bob know the servers public key KS. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows:
To summarize, Alice sends her secret to the Server encrypted with the Servers public key, while Bob sends the newly generated key, also under encryption. The Server XORs the two values together and sends the result to Alice. As a result, both Alice and Bob know K. Suppose that evil Charlie eavesdropped on Bobs message to the Server. How can he, with the help of his equally evil buddy Don, extract the key K that Alice and Bob are using to protect their communications?
Answer:
General conversation:
K = ka (k ALICE Ka K Enc ks (K) SERVER BOB SERVER BOB Enc ks (Ka)
Charlie
Enc ks (K)
Charlie
Observe pattern of key from Bob to Alice Step 3: Eavesdropped from A using Don:
Enc ks (Ka) ALICE SERVER BOB
Charlie
Charlie
Enc ks (K)
Enc ks (K)
Enc ks (K)
FINAL SHARING OF ENCRYPTED KEY FROM BOTH ALICE AND BOB BETWEEN DON AND CHARLIE
CHARLIE => Enc ks (K) DON => Enc ks (Ka) By getting both encrypted key they start studying the encrypted keys pattern and obtain the key. Say the encryption technique is simple multiplication: Servers key (Public): 5 Alice (sample key): 7 Encrypted Alice key: 5 X 7 = 35 Bob (secret key): 4 Encrypted bob key: 5 X 4 = 20
Studying both 35 and 20 Charlie and don both are divisible by 5 which is a public key
Now using Bobs encrypted message 20 and public key 5 => computing the secret message => which is 4
NOTE:
Sorry sir the message sent by u came to me in a already read format so didnt noticed your mail , today only got the mail so completed my assignment sir and forwarded to you Please do consider my Assignment