level06.html 1.4 KB

123456789101112131415161718192021222324
  1. <p>Routers and modems can read the contents of packets they relay. To protect confidentiality on the Internet, we should thus use <strong>encryption</strong>
  2. to make our messages look like nonsense to outsiders. In this level, we introduce a simple encryption protocol that allows two parties to communicate
  3. privately.</p>
  4. <p>This "encryption" protocol involves packets with three different types of messages (specified at the application layer):</p>
  5. <ul>
  6. <li><strong>keyrequest</strong> is used to specify one's own key and request the other party's key.</li>
  7. <li><strong>keyresponse</strong> is a response to a <strong>keyrequest</strong> and includes only one's own key.</li>
  8. <li>After these first two steps have occurred, the two parties can exchange <strong>message</strong> packets, encrypted with the recipient's key.</li>
  9. </ul>
  10. <p>To pass this level, send an <strong>encrypted message</strong> from Alice's computer to Bob's computer. You must first have Alice and Bob exchange keys.
  11. Alice's encryption key is <strong>12345</strong>.</p>
  12. <p><em><strong>Hint:</strong> there is an example of how the encryption protocol works at the top of the field. Use the <span class="button">pause</span>
  13. button to see what the values of the packet headers are in the protocol.</em></p>
  14. <h3>Level Objectives</h3>
  15. <ul>
  16. <li>have Alice and Bob exchange encryption keys</li>
  17. <li>send an encrypted message from Alice to Bob</li>
  18. </ul>