Q3. A student proposed to modify IKEv2 as follows. The student proposed to compute the authenticators in the two messages in Phase 1.2 as follows when the mutual authentication is done with pre-shared secrets SKpi and SKpr: • AUTHi=prf(SKpi, IDi) • AUTHr=prf(SKpr, IDr) where AUTHi and AUTHr are the authenticator in the first and second messages in Phase 1.2, IDi and IDr are the indentity of the Initiator and Responder, SKpi and SKpr are the secret keys computed in Phase 1.1. Other parts in the original IKEv2 remain the same.
• Does this modified version of IKEV2 provide the mutual authentication service when the Initiator and Responder decide to use the pre-shared secret SKpi
and SKpr for mutual authentication? Justify your answer briefly.
14 marks
• Does this modified version of IKEV2 provide the data authentication service for the two messages in Phase 1.1 when the Initiator and Responder decide to use the pre-shared secret SKpi and SKpr for mutual authentication? Justify
your answer briefly.
14 marks
#Sales Offer!| Get upto 25% Off: