1. Suppose Alice wants to visit the Web site activist.com using a TOR-like service. This service uses two non-colluding proxy servers, Proxy1 and Proxy2. Alice first obtains the certificates (each...


1. Suppose Alice wants to visit the Web site activist.com using a TOR-like service. This service uses two non-colluding proxy servers, Proxy1 and Proxy2. Alice first obtains the certificates (each containing a public key) for Proxy1 and Proxy2 from some central server. Denote
K
1
+( ),
K

2
+( ),
K
1

-
( ), and
K
2
-( ) for the encryption/decryption with public and private RSA keys.


a. Using a timing diagram, provide a protocol (as simple as possible) that enables Alice to establish a shared session key
S
1
with Proxy1. Denote
S
1(m) for encryption/decryption of data
m
with the shared key
S
1.


b. Using a timing diagram, provide a protocol (as simple as possible) that allows Alice to establish a shared session key
S
2
with Proxy2 without revealing her IP address to Proxy2.


c. Assume now that shared keys
S
1
and
S
2
are now established. Using a timing diagram, provide a protocol (as simple as possible and not using public-key cryptography) that allows Alice to request an html page from activist.com without revealing her IP address to Proxy2 and without revealing to Proxy1 which site she is visiting. Your diagram should end with an HTTP request arriving at activist.com.



Dec 10, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here