KEY AND MESSAGE EXCHANGE
#1

Presented by:
MS.T.JEEVITHA

[attachment=11525]
Step-by-Step Key and Message Exchange
Cryptographic private/public key solutions are susceptible to man-in-the-middle attacks. These attacks take a variety of forms, including eavesdropping, substitution, denial of service, and phishing. The Cryptography Next Generation (CNG) secure communication example addresses substitution, in which a third party (Mallory) inserts himself between two communication endpoints (Alice and Bob).
The following sections provide background information, illustrations, and step-by-step instructions for the five security versions discussed in the CNG example overview:
Version 1: Basic message exchange
Version 2: Unsigned key and unsigned message exchange:
Without interception
With interception
Version 3: Signed key and signed message exchange
Version 4: Signed key and signed message exchange with detection
Version 5: Signed key and signed message exchange with application termination
Version 1: Basic Message Exchange
The following illustration shows Alice and Bob sending messages without a man-in-the-middle attack. The messages are not encrypted or digitally signed. The CNG example demonstrates this procedure when you select version 1. A step-by-step description of the process is provided after the illustration.
Version 1: Basic message exchange
Version 2: Unsigned Keys and Unsigned Messages Without Interception
The following illustration shows key and message exchange without a man-in-the-middle attack. The CNG example demonstrates this procedure when you select version 2 and turn off interception by Mallory. A step-by-step description of the process is provided after the illustration.
Version 2: Unsigned Keys and Unsigned Messages with Interception
The following illustration shows key and message flow with a man-in-the-middle attack. The CNG example demonstrates this procedure when you select version 2 and enable interception by Mallory.
Version 3: Signed Keys and Signed Messages with Interception
The following illustration shows cryptographic key and message flow, a man-in-the-middle attack, and the use of digital signatures to sign keys and messages. The CNG example demonstrates this scenario when you select version 3 and enable interception by Mallory.
Version 4: Signed Keys and Signed Messages with Detection
The following illustration shows cryptographic key and message flow, a man-in-the-middle attack, and the use of digital signatures to sign keys and messages. In addition, the version 4 software detects invalid signatures. The CNG example demonstrates this scenario when you select version 4 and enable interception by Mallory.
Version 5: Signed Keys and Signed Messages with Session Termination
The following illustration shows cryptographic key and message flow, a man-in-the-middle attack, and the use of digital signatures to sign keys and messages. As in version 4, invalid signatures are detected. The CNG example demonstrates this scenario when you select version 5 and enable Interception by Mallory.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: engine and transmission exchange, security error key exchange disabled boost, key exchange download, class diagram of distributed key management framework using cooperative message authentication in vanets, report of a distributed key management framework using cooperative message authentication in vanets, interception commissioner, vitthal rukmini image and message,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,145 31-10-2015, 02:16 PM
Last Post: seminar report asees
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,118 29-11-2012, 12:56 PM
Last Post: seminar details
  Public Key Cryptography and the RSA algorithm seminar class 1 2,468 23-11-2012, 11:32 AM
Last Post: seminar details
  Intelligent Electronic Devices (IEDs) and Supervisory Control and Data Acquisition computer girl 0 1,140 09-06-2012, 06:01 PM
Last Post: computer girl
  The 8051 Microcontroller and Embedded Systems Using Assembly and C computer girl 0 1,035 04-06-2012, 05:41 PM
Last Post: computer girl
  BLOCK EXTENSIBLE EXCHANGE PROTOCOL A SEMINAR REPORT Computer Science Clay 3 1,989 03-12-2011, 09:41 AM
Last Post: seminar addict
  Lean and Zoom: Proximity-Aware User Interface and Content Magnification seminar class 0 927 05-05-2011, 02:39 PM
Last Post: seminar class
  Efficient and Secure Content Processing and Distribution by Cooperative Intermediarie project topics 5 4,718 03-05-2011, 10:33 AM
Last Post: seminar class
  Network Monitoring and Measurement and its application in security field seminar surveyer 1 1,411 28-03-2011, 10:36 AM
Last Post: seminar class
  Virus Attack on Computers And Mobiles And Palmtops full report computer science technology 2 3,456 18-03-2011, 12:08 PM
Last Post: seminar class

Forum Jump: