Title: Design and analyze communication protocol for Forum system-Two-level hierarchy of symmetric encryption Protocol
As per the requirement for the private online forum system, a communication protocol has been created. The users will be able to create groups, discuss online and a lot more while protecting their privacy as well. The design is secure and lightweight scheme which is composed of the important security attributes along with the resistance of various attacks. The design ensures the anonymity of the users, verification of passwords is also included in the design along with the no password-verifier in the HA to maintain secret keys. Here, the design includes public and private keys in order to secure the channel. In the design, a two-level hierarchy of symmetric encryption protocol has been used in the design. This approach has been used in the design of the communication system. In this approach, the design would utilize trusted keys distribution. Here, each of the actors who take part in the network would be sharing secret keys which is also known as the secret keys within the distribution center. The distribution center would be allowing the mode of generation of keys which would be used by the actors of the digital communication protocol while exchanging messages which are also known as session keys. This would help in the security of the messages which are being exchanged over the digital system.
Moreover, enhanced attributes have been included in the Two-level hierarchy of symmetric encryption Protocol in order to maintain the anonymity of the design. With this, the data which would be exchanged over this design will remain encrypted in the encrypted channel. As per the proposed design, the user will have to go through a series of phases in order to create their account in the forum system. The user has to first go through the registration phase where they have to register themselves to the forum system through the secure communication channel. After this phase the user will have their account created.
The data items that are used in the design are defined in the following,
String: It is basically considered to be a type of data and this has been implemented in the design as an array data structure of bytes which is responsible for storing a series of elements, mainly characters that are encoded.
Syntax: This is referred to the format or the structure of the data and signal levels. It is responsible for determining the ways in which data could be read in the form of bits.
Semantics: It is the interpretation of each section of bits or fields. It could specify the definition in which action to be taken in particular pattern.
Timing: The timing refers to when the data should be sent and the speed of the data to be sent.
In the Two-level hierarchy of symmetric encryption Protocol, the message is the most important asset as a part of the communication system. It could be referred to the data or a packet of information which is transferred from the source to the destination in order to restore the communication. The message in this symmetric encryption Protocol, of the communication system could be in various forms for example texts files.
Figure 1: Communication system of the design
The messages have some components which help in the transmission of the messages. These are stated in the following,
Sender: In the forum, there has to be a source who will be acting as the media from whom the messages will be sourced.
Receiver: This could be termed as the destination to which the messages are finally arrived through a media of channel.
Channel: The media of channel which has been mentioned in the above is nothing but the transmission medium which acts as the bridge between the communication.
Suppose an actor A wishes to establish a connection with B over the communication platform and would require one time session key. a set up for message exchange between A to B through the communication forum where, A would have master key Ka received by the KDC and B would have Kb with KDC. A had initiated the communication by generating nonce and also sends its identifier to B in the form of plain text. A has initiated the authentication exchange by generating nonce, the nonce is stated to be as IDA || IDB || N1. There would be a unique identifier for each message identification or the nonce which is referred to as N1. In the session, there is a onetime session key which is known as Ks. Also, there is the unique identifier for A in the session which is known as IDA moreover, the last two items would be encrypted with Kb which is to be sent in order to identify the connection between A and B. A will receive the nonce in encrypted form along with session key which is E(Ka. [K, || IDA || IDg || N?]) || E(K? [K¸ || IDA]). Now, A would store the session key and forward it to B which is known as E(Kb,[Ks || IDA]). From the figure above, it could be observed that, Message of B also includes the block encrypted along with secret key shared by B which is known as E(Kb,[Ks || IDA]). At this point, a session key has been received by A and B which leads them to begin their protected exchange. But there are two more steps which are needed, B would send a nonce N2 to A and A would use Ks to respond with f(N2) where, f is the function performing transformation on N2.
The Two-level hierarchy of symmetric encryption Protocol includes public and private keys in order to secure the channel. In the protocol, a two-level hierarchy of symmetric encryption protocol has been used in the design. There have been certain tests which are overcome by the Two-level hierarchy of symmetric encryption Protocol as in the proposed scheme has found to be maintaining the anonymity of the user and reveals no information of them. This approach has been used in the design of the communication system. In this approach, the design would utilize trusted keys distribution. The distribution center would be allowing the mode of generation of keys which would be used by the actors of the digital communication protocol while exchanging messages which are also known as session keys. The symmetric encryption Protocol does not consist of the values which are user specific in the request which would be made by the user. It is so due to the generation of random number which is made in every login request which makes the login request have a lot of or different value of the message request. This would help in the security as well as anonymity of the messages sent by the user, which indirectly means that the forum is capable of making the user anonymous over the digital system as well. In the Two-level hierarchy of symmetric encryption Protocol, no external threat or third party will be enabled in deriving specific number or values of the login requests which ensures the anonymity of the protocol.
The authentication capability of the Two-level hierarchy of symmetric encryption Protocol has been verified and it has been made through certain tests. The authentication has been performed between the user and the home agent as well as that of the foreign agent. In the proposed solution, authentication has been achieved with the help of decryption and verification of the authentication parameters that will be present in the messages. In order to authenticate the users, the Two-level hierarchy of symmetric encryption Protocol would necessarily require validation of the user in order to communicate with the forum. No adversary will be able to calculate the correct keys without the knowledge of other attributes. This results as restricting the unauthorized access by validating the user password locally.
Here, the Two-level hierarchy of symmetric encryption Protocol has been efficient authentication as per the tests. Suppose there has been a set up for message exchange between A to B through the communication forum where, A has initiated the authentication exchange by generating nonce and also sends its identifier to B in the form of plain text. A will receive the nonce in encrypted form along with session key. B would notify the need of session key to the distribution center which includes its identifier and nonce as well. This in turn would return the nonce to B which also includes the encrypted message session key. Message of B also includes the block encrypted along with secret key shared by B. This block would determine issue to credentials to A, also, the block would specify intended recipient, an expiration period of the credentials and nonce received from A. the distribution center passes the nonce to A the nonce of B and block encrypted with secret keys which is shared by B with the distribution center. Then the distribution center would serve block as a ticket pass for A for subsequent authentication. Then the block would also verify if B has received message from A’s initial ID and provides a session key with time limit on the use. A would transmit the ticket to B and B would get the secret key by which B could decrypt the message and recover the nonce.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download