Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Case Study Expert

Assignment: Needham-Schroeder Protocol

The purpose of this assignment is to give you experience formalising requirements in the Z notation. The case study is a simplified version of the Needham-Schroeder protocol in which agents send each other encrypted messages, where the messages are encrypted (and decrypted) using keys supplied by a trusted server. The widely used Kerberos computer network authentication protocol is based on the Needham-Schroeder protocol.

Task description

Your task is to complete the missing declarations and predicates in the following partial Z specification of the Needham- Schroeder protocol. A template LaTeX document of this partial specification is available on the Blackboard site. A demonstration of using TeXstudio to produce LaTeX documents, and CZT to type-check Z specifications in LaTeX will be given in the first lecture slot of Week 4.

A pdf file of your completed assignment must be submitted via Blackboard by the due date.

Partial Z specification

Let the given sets

[Message, EncryptedMessage]

denote the set of all possible messages and encrypted messages, respectively. The actual way a message or encrypted message is internally structured is of no concern. Then a key can be thought of as a function that takes an element of type message and converts it into an encrypted message. Hence we can define the set of all keys by

Key == Message → EncryptedMessage

Suppose the agents and server are identified via their names, and we have the given set

[Name]

of all possible names.

The following functions allow us to extract information from messages. For a request message sent to a server, this returns the name of the agent which sent the message, and other returns the name of the agent with which it wants to communicate. For a message with a key, key returns the key, and other returns the agent that can be communicated with using that key.

this : Message → Name key : Message →› Key
other : Message → Name
dom this ∩ dom key = ∅
dom this ∪ dom key = Message
The predicate states that no message is both a request message (in the domain of this) and a key message (in the domain of key). Also, all messages are either request or key messages.
An agent is modelled as having a name, the name of the server (which is not an agent), and a table whose entries map names of other agents and the server to the key used to communicate with them.

Agent
name, serverName : Name

table : Name →

Key

name ƒ= serverName

Initially, the table contains a single key for communication between the agent and the server.

Init
Agent
. . .

An agent may request a key for communication with another agent for which it does not already have a key. This request is sent to the server via a non-encrypted message containing the agent's name and that of the other agent.

RequestKey

An agent may receive a key via an encrypted message from the server and add it to its table. This message also contains the name of the other agent with which the agent can communicate using the received key. A second encrypted message is also received from the server, decrypted and its further encrypted content is sent to the other agent.

ReceiveKeyFromServer

An agent may receive a key via an encrypted message from another agent (but encrypted with the agent's key for communication with the server) and add it to its table. The message also contains the name of the other agent with which the agent can communicate using the received key.

ReceiveKeyFromAgent

Case Study, Writing

  • Category:- Case Study
  • Reference No.:- M91720001
  • Price:- $110

Guranteed 48 Hours Delivery, In Price:- $110

Have any Question?


Related Questions in Case Study

This case study relates to the firestone tyre company in

This case study relates to the Firestone Tyre Company in the United States in 2000, and refers to the now famous tyre recall that took place during August of that year. You have been provided with case study details in t ...

Question - a colleague reaches out to you requesting

Question - A colleague reaches out to you requesting information on a client. You do not have a lot of information, as you have only interviewed the client one time. They are working with the client's spouse, who is also ...

The concord disaster discuss what you think were the most

The Concord Disaster discuss what you think were the most critical factors in that disaster and why

Factors related to medicationsocial workers are often asked

Factors Related to Medication Social workers are often asked about the role of medications. What are some potential risks and rewards of using medications to treat the problems of living versus mental illness? Think abou ...

Assignment - media evolution analysisassignment details

Assignment - Media Evolution Analysis Assignment details: Following our lectures and discussions in class, choose one media technology or phenomenon and research its historical trajectory. In particular, you should focus ...

Fever case study -elena is a 74-year-old hispanic f who was

Fever Case Study - Elena is a 74-year-old Hispanic F who was recently discharged one week ago from a local rehabilitation center after status post left hip replacement (one month ago). Negative for any complications. PMH ...

Assignment -read the hefty hardware case study and answer

Assignment - Read the Hefty Hardware Case Study and answer the questions. Discussion Questions 1) Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both ...

Rationalesafety and risk management are critical aspects of

Rationale Safety and Risk Management are critical aspects of a workplace and breaches are punishable under Work Health and Safety Law. This task encourages students to analyse and conceptualise responses to safety breach ...

Case study assignment -case study - observations are

Case Study Assignment - Case study - Observations are Critical in Patient Safety (23/8/17). A complaint alleging unsatisfactory professional conduct was made against a Registered Nurse (RN) who it was claimed failed in h ...

Growth development and ageing for exercise scientists

Growth, Development and Ageing for Exercise Scientists Assessment Task - Video Critique Instructions This assessment task will assess your ability to apply key concepts of growth, development and ageing to a series of ca ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As