Symmetric Key Distribution using KDC Simulation | Needham-Schroeder Protocol
This project demonstrates the implementation of the Needham-Schroeder symmetric-key authentication protocol using Python. The system includes a Key Distribution Center (KDC), Alice, and Bob communicating securely through TCP sockets.
Features:
• Diffie-Hellman Key Exchange
• Secure Session Key Distribution
• Simplified DES (S-DES) Encryption
• Nonce-based Mutual Authentication
• Replay Attack Demonstration
• Timestamp-based Replay Attack Prevention
• Secure Encrypted Chat using Session Keys
Workflow:
1. Alice and Bob establish master keys with the KDC using Diffie-Hellman.
2. The KDC generates and distributes a secure session key.
3. Alice forwards Bob’s encrypted message.
4. Bob verifies Alice using nonce challenge-response authentication.
5. Secure encrypted communication begins.
⚠️ Replay Attack Demo:
The project also demonstrates how replay attacks can succeed without timestamps and how timestamp validation prevents such attacks effectively.
Technologies Used:
• Python
• TCP Sockets
• Simplified DES (S-DES)
• Diffie-Hellman Key Exchange
Thank you for watching!
#cybersecurity #kdc #NeedhamSchroeder #pythonprojects #networksecurity #encryption #ReplayAttack #DiffieHellman #SDES #computernetwork