1. Introduction and Context 1.1 Overview of Nepal’s Current Cybersecurity Landscape Nepal’s rapid shift toward digitalization, evidenced by the growing use of e-governance systems, mobile banking, and online platforms, has outpaced the development of its cybersecurity infrastructure and policies [1]. This imbalance has exposed government institutions, private organizations, and citizens to escalating cyber threats. The present cybersecurity landscape in Nepal can be summarized by several critical factors: A. Recurring Data Breaches and Minimal Accountability: A string of high-profile breaches underscores the vulnerability of Nepal’s digital environment. Most recently, the personal information of 7,400 students from the Institute of Engineering (IOE) was put up for sale on the dark web, leaking names, addresses, dates of birth, and phone numbers [2]. Earlier incidents include: 2017: Department of Passport hacked; NIC Asia Bank breach attempted to transfer USD 4.4 mill...
Introduction The Station To Station Protocol (STS) is a cryptographic key agreement scheme. The protocol is based on the classic Diffie-Hellman, which is not secure against a man-in-the-middle attack. This protocol assumes that the parties have signature keys which are used to sign messages, thereby providing security against man-in-the-middle attacks. The following data must be generated before initiating the protocol. An asymmetric signature keypair for each party Key establishment parameters Through the exchange of Diffie-Hellman (DH) parameters and signed certificates, both participants verify each other's identities and establish a shared session key for encrypted message exchange. This simulation covers the following components: Certificate Authority (CA) : Responsible for generating and signing certificates. Participants (Alice and Bob) : Engage in key exchange and secure communication using the STS protocol. Code Structure I have divided this simulation structure into two...