Linear-time Temporal Logic (LTL) and Computation Tree Logic (CTL) IT Assignment Help
- Country :
United Kingdom
Assignment Task
Task
Demonstrate the application of formalisms to specify system properties using temporal logics like Linear-time Temporal Logic (LTL) and Computation Tree Logic (CTL)Use tools and analysis techniques to study and reason about critical properties of the concurrent systems, including security protocolsConsider the following five-step communication protocol with symmetric key, which is known as Needham-Schroeder protocol used to secure an insecure network. The protocol involves the principals A (initiator) and B (responder), and an authentication server S.
Step 1: Machine A sends a message to Server S, intending to communicate with Machine B, where NA is a Nonce generated by Machine A.
A -> S : A, B, NA
Step 2: Server S sends message back to the Machine A containing KAB, and one more encrypted copy of KAB which will be send to the Machine B by the Machine A. KA and KB are the Keys of A and B shared with S, respectively. KAB is a secret session key for A and B provided by S.
S -> A : {NA, B, KAB, {KAB,A}KB} KA
Step 3: Machine A forwards {KAB, A}KB, encrypted copy of KAB from Step 2, to the Machine B. With the key it has, Machine B can decrypt it. This is because the message has been encrypted by S with the symmetric key KB of the Machine B.
A -> B : {KAB,A}KB
Step 4: Machine B replies to the Machine A by sending a nonce value encrypted by KAB, confirming that machine B has the secret session key provided by the server S.
B -> A : {NB}KAB
Step 5: Machine A then performs a simple operation on the machine B's nonce and returns it to the Machine B just to verify that Machine A has the key.
This IT Assignment has been solved by our IT Experts at Exam Question Bank. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment Experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.