Search for question
Question

Part 1: The first part is about:

1.

Describing the protocol in standard cryptographic notation, also known as Alice-Bob

notation. Information on this notation can be found at

https://en.wikipedia.org/wiki/Security_protocol_notation

and

https://en.wikipedia.org/wiki/Message_sequence_chart.

2. Talk about the weakness or vulnerabilities of the protocol if any. If exists, how to improve

the security posture of that protocol.

*** Protocol description and analysis (for Part 1):

Protocol description: required to provide a graphical description of the protocol as

Alice-Bob notation.

• Security properties: A description of what is the security property that the protocol

intends to achieve.

Discussion of weakness: Discuss if there exists any vulnerability within the protocol.

• Justification: Improve if there is any flaw and then add an explanation of why the

protocol does satisfy the intended security property.

Fig: 1