diff_months: 21

Linear-time Temporal Logic (LTL) and Computation Tree Logic (CTL) IT Assignment Help

Download Solution Now
Added on: 2022-08-20 00:00:00
Order Code: 12_21_22744_347
Question Task Id: 391301
  • Country :

    United Kingdom

Assignment Task

 

Task

Demonstrate the application of formalisms to specify system properties using temporal logics like Linear-time Temporal Logic (LTL) and Computation Tree Logic (CTL)Use tools and analysis techniques to study and reason about critical properties of the concurrent systems, including security protocolsConsider the following five-step communication protocol with symmetric key, which is known as Needham-Schroeder protocol used to secure an insecure network. The protocol involves the principals A (initiator) and B (responder), and an authentication server S.

Step 1: Machine A sends a message to Server S, intending to communicate with Machine B, where NA is a Nonce generated by Machine A.

A -> S : A, B, NA

Step 2: Server S sends message back to the Machine A containing KAB, and one more encrypted copy of KAB which will be send to the Machine B by the Machine A. KA and KB are the Keys of A and B shared with S, respectively. KAB is a secret session key for A and B provided by S.

S -> A : {NA, B, KAB, {KAB,A}KB} KA

Step 3: Machine A forwards {KAB, A}KB, encrypted copy of KAB from Step 2, to the Machine B. With the key it has, Machine B can decrypt it. This is because the message has been encrypted by S with the symmetric key KB of the Machine B.

A -> B : {KAB,A}KB

Step 4: Machine B replies to the Machine A by sending a nonce value encrypted by KAB, confirming that machine B has the secret session key provided by the server S.

B -> A : {NB}KAB

Step 5: Machine A then performs a simple operation on the machine B's nonce and returns it to the Machine B just to verify that Machine A has the key.

    


This IT Assignment has been solved by our IT Experts at Exam Question Bank. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
    
Be it a used or new solution, the quality of the work submitted by our assignment Experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : KHUSHWANT
  • Posted on : December 27th, 2019
  • Downloads : 0
  • Views : 240

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more