Cryptography problem

Assignment Help Computer Network Security
Reference no: EM13805167

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret (Alice authenticates to either Bob or Carol by proving knowledge of KA, Bob with KB, and Carol with KC).

Assume a cryptographic algorithm that is linear in the length of the key to perform "good guy operations," e.g., encryption, decryption, key generation, integrity check generation, and integrity check verification; and that it is exponential in the length of the key to perform "bad guy operations," e.g., brute force breaking.

In a well-crafted document, fully discuss the following items. Provide details and justifications for each item. This should be a 4- to 6-page Microsoft Word document. Cite your sources, wherever required.

  1. Advances in computation make computers an order of magnitude faster. Does this work to the advantage of the good guys, the bad guys, or neither? Justify your answer with reasoning.
  2. Assuming a very large message and public keys user, describe what information would need to be included in each of the following:
  • Bob sending an unencrypted, signed message to Alice.
  • Bob sending an unencrypted, signed message to multiple recipients (Alice and Carol).
  • Bob sending an encrypted, signed message to Alice.
  • Bob sending an encrypted, signed message to Alice and Carol.
  • Explain efficiency issues and alternate methods that would work but be less efficient.

Analyze whether it will be easier to have nonrepudiation with the use of public or private user keys. How about plausible deniability?

Reference no: EM13805167

Questions Cloud

Material requirement planning chart : Create an Master Production Schedule and a Material Requirement Planning Chart
How the information would be used to optimize network : The statistics are in the form of counters that start from zero when a valid entry is created. Explained how the information would be used to optimize network. Provided examples of how to change network, based on information gathered and analyzed fro..
Testing the reliability of test issues : How would you test the reliability of your test? How would you assess the validity?
Is international relations a science or an art : To what extent can we speak of a coherent theory of Liberalism in International Relations. DoesKeohane and Nye's notion of complex interdependenceprovide us with a sound explanation of contermporary International Relations
Cryptography problem : Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret
Write a report on mobile application in hospitality industry : Write a report on Mobile applications in the hospitality industry.
Supply equation and the market supply equation. : Derive the firm's long-run supply equation and the market supply equation.
Calculate theoretical cycle efficiency : Calculate the indicted power, the brake power, the brake thermal efficiency and Calculate theoretical cycle efficiency.
Complementary and alternative medicine : Complementary and Alternative Medicine

Reviews

Write a Review

Computer Network Security Questions & Answers

  Information on the current security state

You selected an organisation, and provided information on the current security state and made suggestions of improvements to their security

  Case study- ping sweeps and port scans

Case Study: Ping Sweeps and Port Scans, Your boss has just heard about some nefarious computer activities called ping sweeps and port scans

  How has the role of private security changed since the 911

1. how has the role of private security changed since the 911 attacks?what are some of the roles that private

  Analyze three enhancements that have been added to wireless

wireless networking and unified communication networks please respond to the following1.analyze three enhancements that

  To ensure the security of the files used by the new web site

To ensure the security of the files used by the new Web site, files need to access controls that limit which users can view and execute them. To further your understanding of file permissions, describe in detail these 5 file listings, explain a..

  Discuss the role they play in computer crime

Discussing the role they play in computer crime. Be sure to research and document cases to support each law and your discussion

  Which type of computer crime describes actions

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

  Describe the environment of your forensic workstation

Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory.

  Discuss the requirements for remote administration

Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here.

  How do you plan to validate the data after acquiring it

What diplomatic strategies should you use with the network administrator and what privacy issues might be a concern with bank records (bank account numbers, customer names, etc.)?

  Thoughts regarding vulnerabilities surrounding computing

What are your thoughts regarding vulnerabilities surrounding the computing world today and the risks of computers being attacked.

  Describe the cyber attack lifecycle

Describe the cyber attack lifecycle. Describe a bot-net and how it can be used by hackers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd