国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

COMP3334代做、SQL設計編程代寫

時間:2024-04-09  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



COMP3334 Project
End-to-end encrypted chat web application
Semester 2, 2023/2024
Nowadays, web services are the most
common form of applications that users are
exposed to. Web browsers become the most
popular application on a computer that
enables users to access those web services.
Ensuring the security of web services is
essential for the Internet. Moreover, privacy
of communications is an important feature of
modern times. Your job is to implement an
end-to-end encrypted chat web application
and secure various aspects of the website.
Overview
Objectives
1. Adapt a basic chat web application to become a secure E2EE chat web app
2. Comply with some of the requirements in NIST Special Publication 800-63B “Digital
Identity Guidelines – Authentication and Lifecycle Management” for US federal
agencies (which is also a reference for other types of systems)
3. Implement a secure MFA mechanism based on passwords and OTP (or FIDO2)
4. Encrypt communications between two users so that the server does not know the
content of the messages (E2E encryption)
5. Protect communications in transit by configuring a modern TLS deployment
6. Package a docker image of your web app
Requirements (authentication)
1. From NIST Special Publication 800-63B:
1. Comply with all SHALL and SHOULD requirements from sections listed below
2. Use the following authenticators:
• User-chosen Memorized Secret (i.e., password/passphrase)
• and Single-Factor OTP Device (e.g., Google Authenticator)
• or Single-Factor Cryptographic Device (e.g., Yubikey) if you have one
• and Look-Up Secrets (recovery keys)
• Comply with related requirements in §5.1 and §4.2.2
• §5.1.1.2: “Memorized secrets SHALL be salted and hashed using a suitable one-way key
derivation function”
• See our Password Security lecture for an appropriate function
• Memorized Secret Verifiers (§5.1.1.2)
• Choose “Passwords obtained from previous breach corpuses” and refer to
https://haveibeenpwned.com/API/v3#PwnedPasswords for the corpus to check against
• §5.2.8 and §5.2.9 are automatically complied
Requirements (authentication)
1. From NIST Special Publication 800-63B:
3. §5.2.2: Implement rate-limiting mechanisms AND image-based CAPTCHAs
4. Implement new account registration and bind authenticators (OTP/Yubikey and recovery keys) at
the same time
• Optional: provide a way to change authenticators after account registration
5. §7.1: Implement proper session binding requirements
6. Exceptions:
• OTP authenticators — particularly software-based OTP generators — SHOULD discourage and
SHALL NOT facilitate the cloning of the secret key onto multiple devices.
• Google Authenticator and related apps are OK
Requirements (E2EE chat)
2. Once users are logged in, secure chat messages between two users in a way so that the server cannot
decrypt the messages
1. Use the ECDH key exchange protocol to establish a shared secret between two users
• Leverage the WebCrypto API, see demo https://webkit.org/demos/webcrypto/ecdh.html
• Exchanged information during the key exchange can be sent through the server
• The server is trusted not to modify messages of the key exchange
• Choose P-384 as the underlying curve
2. Derive two 256-bit AES-GCM encryption keys and two 256-bit MAC keys from the shared secret
using HKDF-SHA256
• One key for encryption between user1 to user2, and another one from user2 to user1
• Using WebCrypto API again, see https://developer.mozilla.org/enUS/docs/Web/API/HkdfParams
• The salt should be unique so another key derivation in the future produces different keys, use
for instance a counter starting at 1
• The info parameter should represent the current context (e.g., “CHAT_KEY_USER1to2” for the
key for user1user2, and “CHAT_MAC_USER1to2” for the MAC key for user1user2)
Requirements (E2EE chat)
2. Once users are logged in, secure chat messages between two users in a way so that the server cannot
decrypt the messages
3. Messages will be encrypted using AES in GCM mode
• 96-bit IVs are counters representing the number of messages encrypted with the same key
• Note: GCM does not require unpredictable IVs, but unique IVs
• Send the IV together with the ciphertext to the recipient
• As a recipient, verify that IV𝑖𝑖 > IV𝑖𝑖−1 to prevent replay attacks
• Protect the IV with HMAC-SHA256 using the derived MAC key to prevent the attacker from
choosing IVs
• Associated data should reflect the current context (e.g., “CHAT_MSG_USER1to2”)
• Authentication tags should be 128 bits
4. Store all key material in the HTML5 Local Storage of the browser to be retrieved after the browser
is reopened
5. Display the history of previous messages being exchanged + new messages
• If Local Storage has been cleared, previous messages cannot be decrypted, show warning
Requirements (E2EE chat)
2. Once users are logged in, secure chat messages between two users in a way so that the server cannot
decrypt the messages
6. All symmetric keys and IVs should be re-derived from the shared secret when user clicks on a
“Refresh” button in the chat (not the browser refresh button), using a new salt
• The participant that requests a change should inform the other party with a special message
composed of the last IV that has been used, the string “change”, altogether protected with
the old MAC key AND the new MAC key
• Two different MACs over the message
• The other party should verify the old MAC before processing the message, then derive
new keys and verify again the new MAC before accepting the new keys
• Both parties should show a message “Keys changed” in the chat history
• Old keys should be kept to decrypt older messages when the browser is reopened, you
should identify which set of keys to use for a given message based on the preceding values
sent during the key exchange (i.e., keep track of user public keys)
• Key exchange messages older than a minute should not be considered as a fresh key
exchange to engaged into
Requirements (E2EE chat)
2. Once users are logged in, secure chat messages between two users in a way so that the server cannot
decrypt the messages
7. When the Local Storage is cleared, or when there is no shared secret for a given recipient, the
sender should initiate the ECDH key exchange using a special message and the recipient should
engage in the key exchange even when there had been a shared secret previously established
8. Chat messages should be encoded using UTF-8, and network messages between users should be
formatted in JSON using your own schema (e.g., {“type”:”ECDH”, “key”:”…”}, {“type”:”msg”,
“ciphertext”:”…”, “IV”:”…”, “MAC”:”…”})
9. Use console.log() to log all crypto operations (including key, IV, plaintext, etc.)
• It should be visually obvious that IVs are not reused, keys change when needed (see next
requirements), etc.
10. The chat app should be protected against cross-site request forgery (CSRF), cross-site scripting
(XSS), and SQL injection attacks
Requirements (TLS)
3. Communications should be encrypted in transit using TLS with the following configuration:
• Reuse Mozilla’s “modern” configuration for nginx, and change it as needed:
• https://ssl-config.mozilla.org/
1. TLS version 1.3 only
2. x25519 Elliptic Curve Group only
3. TLS_CHACHA20_POLY1305_SHA256 cipher suite only
4. No OCSP stappling (since you will use a self-signed CA certificate)
5. HSTS for one week
6. TLS certificate requirements:
1. X.509 version 3
2. ECDSA public key over P-384
3. SHA384 as hashing algorithm for signature
4. CA flag (critical): false
5. Key Usage (critical) = Digital Signature
6. Extended Key Usage = Server Authentication
7. Include both Subject Key Identifier and Authority Key Identifier
8. Validity period = ** days
Requirements (TLS)
3. Communications should be encrypted in transit using TLS with the following configuration:
7. The website should be hosted at
https://group-[your-group-number].comp3334.xavier2dc.fr:8443/
• Group #10 will be at group-10.comp3334.xavier2dc.fr
8. All subdomains *.comp3334.xavier2dc.fr will redirect to 127.0.0.1
• You can effectively use “group-X.comp3334.xavier2dc.fr” instead of “localhost”
• If you do not host the docker container on localhost,
add a manual entry in your hosts file
• Linux: /etc/hosts
• Windows: C:\Windows\System**\drivers\etc\hosts
9. Issue the certificate from the given CA certificate and private key
• Use the domain name corresponding to your group
• Domain should appear as both Common Name and Subject Alternative Name
10. The CA certificate is domain-constrained to subdomains of comp3334.xavier2dc.fr, meaning
you can safely trust it on your computer (nobody can generate valid certificates for other
domains)

Simple Chat Demo
1. Deploy the docker container using the following line within the folder that contains the dockercompose.yaml file:
$ sudo docker-compose up -d
2. So far, the chat app works over plain HTTP on port 8080, access it at:
http://group-0.comp3334.xavier2dc.fr:8080
3. Open a new private window of your browser and access the website again
1. Chrome:
2. Firefox:
4. Login as Alice (password: password123) on the first window
5. Login as Bob (password: password456) on the second (private) window
6. Select Bob as contact from Alice’s chat, select Alice as contact from Bob’s chat
7. Send messages each other!
8. When modifying the server-side (app.py) or client-side (login.html, chat.html), simply restart the
docker container, you do not need to rebuild the container:
$ sudo docker restart [you-container-name]-webapp-1
Areas of assessments
1. Explanations of your solution and design [50%]
• Provide list of features/requirements implemented
• Describe how your solution works, especially explain how user passwords are
stored, verified, which libraries do you use, how key materials are derived, how
do you store them, their size, how do you generate the domain certificate, etc.
• Show autonomy and creativity when requirements allow
2. Implementation of your solution & demo [50%]
• Follow proper coding style, write informative comments, give concise and
relevant variable names, respect indentation, stay consistent in style
• Make things work!
Submission
• Submit a ZIP’d file containing:
1. Modified chat app docker-compose stack
• “sudo docker-compose up -d” should work!
• Accessing https://group-X.comp3334.xavier2dc.fr:8443/ should work with
a valid certificate issued by the given CA
• Group number is the one you registered on Blackboard
2. PDF report
3. 8-minute video with a demonstration of your solution
• User registration + new chat with existing user + refresh website & reload chat
4. Statement of individual contributions
• Who did what, how much % of the work does that represent?
• Format will be given to you later
• Deadline for submission is Sunday, April 14 @ 23:59 (hard deadline)
Questions?
Technical questions:
• CUI Bowen bowen.cui@connect.polyu.hk
Administrative questions:
• LYU Xinqi xinqi.lyu@connect.polyu.hk
FAQ
1. Can I use a library?
• Depends, does it replace the whole chat protocol with a better and secure chat?
Then, no. You still need to implement a secure chat protocol.
• Does the library implement part of the requirements (e.g., proper session
management, OTP, hashing algorithm, etc.)? Then, yes.
2. How can I rebuild the docker container if I need to modify, say, the nginx config?
1. docker-compose down -v
2. docker-compose build --no-cache
3. docker-compose up -d
3. How can I debug errors?
• docker logs [your-container]
FAQ
4. How does the web chat application work?
1. It is written in Python using Flask
2. It is running behind the WSGI server Gunicorn
3. Which is running behind the reverse proxy nginx (which should provide TLS)
4. The front-end is written in HTML and Javascript
5. The server app writes messages into a MySQL database
請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp













 

掃一掃在手機打開當前頁
  • 上一篇:Ac.F633代做、Python程序語言代寫
  • 下一篇:菲律賓簽證13c(申請13C簽證的條件)
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務 管路
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗證碼 寵物飼養 十大衛浴品牌排行 suno 豆包網頁版入口 wps 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    欧美日韩一区二区三区电影| 国产精品2018| 日本一区二区三区视频在线观看| 久久亚洲免费| 97人人模人人爽人人喊中文字 | 日韩视频精品在线| 欧美图片激情小说| 国产精品电影网| 国产一级大片免费看| 欧美激情18p| 国产黄色激情视频| 欧美亚洲免费在线| 欧美精品一区二区三区在线看午夜| 日韩av大片免费看| 欧美一区二区三区在线播放| 久久精品人成| 国产一区二区三区四区五区加勒比| 欧美极品日韩| 国模吧一区二区三区| 都市激情久久久久久久久久久| 久久久久久人妻一区二区三区| 含羞草久久爱69一区| 亚洲福利av| 久久久精品一区二区三区| 不卡影院一区二区| 日韩精品一区中文字幕| 久久亚洲电影天堂| 欧美激情一二三| 一区二区视频在线观看| 日日狠狠久久偷偷四色综合免费| 国产亚洲精品网站| 国产九九精品视频| 日韩欧美猛交xxxxx无码| 日韩精品在线视频免费观看| 欧美日韩精品免费观看 | 国产av无码专区亚洲精品| 色婷婷综合久久久久| 久久精品视频99| 欧美激情a∨在线视频播放| 无码人妻aⅴ一区二区三区日本| 日本一区视频在线播放| 欧美一区二区影视| www.av一区视频| 日韩专区在线观看| 欧美激情久久久久| 欧美一级在线播放| 国产日韩精品久久| 久久久久久亚洲精品不卡4k岛国| 久久av.com| 国产精品视频网址| xxx一区二区| 久久久久久91| 日韩视频 中文字幕| 色播五月综合| 国产一区视频在线播放| 97久久超碰福利国产精品…| 久久久国产精品亚洲一区| 亚洲一区二区免费在线| 在线视频不卡一区二区三区| 污视频在线免费观看一区二区三区| 日韩av色综合| 国产精品永久在线| 国产精品视频午夜| 日韩免费观看av| 91精品国产91久久久久久久久| 成人福利网站在线观看| 成人动漫在线视频| 国产精品欧美一区二区三区奶水| 天天在线免费视频| 国产精选在线观看91| 国产精品日韩专区| 日韩精品一区二区三区色欲av| 国产精品一区二区三区在线播放| 久久久久久亚洲精品不卡| 亚洲字幕一区二区| 亚洲最大的av网站| 免费一级特黄毛片| 国产精品自拍首页| 久久久成人精品视频| 日本一区二区不卡高清更新| 成人av在线播放观看| 久久99热精品这里久久精品| 国产一区在线免费| 欧美成人中文字幕在线| 国内自拍中文字幕| 国产精品丝袜高跟| 国内精品一区二区| 久久中文久久字幕| 国产日韩中文在线| 九九精品在线播放| 亚洲日本理论电影| 成人羞羞国产免费网站| 欧美激情一二三| 国产精品香蕉视屏| 久久久久久av| 成人9ⅰ免费影视网站| 欧美精品福利在线| 国产精品午夜一区二区欲梦 | 日韩在线免费观看视频| 亚洲a在线播放| 97久草视频| 午夜欧美不卡精品aaaaa| 91久久久久久国产精品| 亚洲精品免费av| 久久久影视精品| 日韩免费观看视频| 国产精品日韩专区| 国产一区二区视频在线观看| 久久97久久97精品免视看| 成人中文字幕在线观看| 无码av天堂一区二区三区| 久久久久久久免费| 狠狠噜天天噜日日噜| 久久亚洲精品成人| 国产一区二区视频在线免费观看| 久热精品在线视频| 成人免费网视频| 日本免费黄视频| 日韩网站免费观看| 国产色一区二区三区| 亚洲色成人www永久在线观看| 久久久免费看| 欧美一级大胆视频| 精品国产免费av| 久久人人爽人人爽人人av | 久久观看最新视频| 欧美 日韩 国产在线观看| 欧美乱妇40p| 国产精彩视频一区二区| 欧美在线视频a| 国产精品自拍小视频| 亚洲一区 在线播放| 久久天堂国产精品| 虎白女粉嫩尤物福利视频| 一区二区在线中文字幕电影视频| 亚洲区一区二区三区| 久久av一区二区三区漫画| 国产综合中文字幕| 天天综合五月天| 国产精品成人一区二区| 91精品久久香蕉国产线看观看| 日韩精品在线观看av| 美日韩精品免费观看视频| 久久精品第九区免费观看| 国产乱码精品一区二区三区卡| 日韩免费在线免费观看| 中文字幕黄色大片| 国产精品热视频| 国产第一页视频| 国产一区福利视频| 日本国产欧美一区二区三区| 久久久久国产视频| 国产精品爽爽爽| 久久人91精品久久久久久不卡| 明星裸体视频一区二区| 一区二区在线观看网站| 国产精品入口日韩视频大尺度 | 中文字幕在线中文字幕日亚韩一区| 久久久久久亚洲| 91精品国产99久久久久久| 精品视频在线观看| 三年中国中文在线观看免费播放 | 日av中文字幕| 一区二区精品国产| 久久精视频免费在线久久完整在线看 | 免费国产黄色网址| 日本免费黄视频| 欧美激情第6页| 国产精品久久久久9999爆乳| 欧美韩国日本精品一区二区三区| 一区二区免费在线视频| 国产精品日韩欧美一区二区三区| 久久久在线观看| 国产乱肥老妇国产一区二| 狠狠97人人婷婷五月| 日产精品久久久一区二区福利| 精品国产乱码久久久久久108| www.亚洲一区| 一本久道高清无码视频| 久久99精品国产99久久6尤物| 国产成人无码a区在线观看视频| 97成人在线免费视频| 国产欧美一区二区视频| 久久成人亚洲精品| 久久精品久久久久久国产 免费| 久久精品人人做人人爽电影| 91|九色|视频| 久久青青草综合| 国产精品99久久99久久久二8| 日韩av免费网站| 亚洲专区国产精品| 欧美激情视频在线免费观看 欧美视频免费一 | 国产精品视频精品| 国产精品视频1区| 精品国内自产拍在线观看| 久久久久久久久久久99| zzijzzij亚洲日本成熟少妇| 久久精品国产99国产精品澳门| 国产精品污www一区二区三区| 久久精品国产欧美激情|