Back to Browse

Symmetric Key Distribution using KDC Simulation

53 views
May 6, 2026
13:32

Symmetric Key Distribution using KDC Simulation | Needham-Schroeder Protocol This project demonstrates the implementation of the Needham-Schroeder symmetric-key authentication protocol using Python. The system includes a Key Distribution Center (KDC), Alice, and Bob communicating securely through TCP sockets. Features: • Diffie-Hellman Key Exchange • Secure Session Key Distribution • Simplified DES (S-DES) Encryption • Nonce-based Mutual Authentication • Replay Attack Demonstration • Timestamp-based Replay Attack Prevention • Secure Encrypted Chat using Session Keys Workflow: 1. Alice and Bob establish master keys with the KDC using Diffie-Hellman. 2. The KDC generates and distributes a secure session key. 3. Alice forwards Bob’s encrypted message. 4. Bob verifies Alice using nonce challenge-response authentication. 5. Secure encrypted communication begins. ⚠️ Replay Attack Demo: The project also demonstrates how replay attacks can succeed without timestamps and how timestamp validation prevents such attacks effectively. Technologies Used: • Python • TCP Sockets • Simplified DES (S-DES) • Diffie-Hellman Key Exchange Thank you for watching! #cybersecurity #kdc #NeedhamSchroeder #pythonprojects #networksecurity #encryption #ReplayAttack #DiffieHellman #SDES #computernetwork

Download

1 formats

Video Formats

360pmp411.8 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Symmetric Key Distribution using KDC Simulation | NatokHD