Describe a meet in the middle attack

Assignment Help Computer Network Security
Reference no: EM131110087

1. Answer the following questions briefly
a. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.

b. What is social engineering? Briefly discuss 3 different social engineering exploits to steal someone's password?

c. If you are given a hash function (say SHA-1), design one-time password scheme for access control to your server. (Hint: You should specify details on how you will generate the passwords maintain them)

d. Describe a covert channel? Give an example and comment on the speed of the covert channel in your example.

e. As we discussed in class, early implementations of RSA, used a common e= 3. What was the security limitation of this choice? Instead, if one were to fix a common d =3 what is the security implication?

2. Consider the Elliptic curve
E: y2 = x3 + 11x + 19 (mod 167)
Suppose E and point P (2, 7) are used for ECC Diffie-Hellman key exchange.
Alice chooses the secret value A = 12 and Bob chooses the secret value B = 31.
a. What value will Alice send to Bob?
b. What does Bob send to Alice?
c. What is the shared secret at the end of the exchange?


3. For this problem you need to run MD5. You may either download a certified version of MD5 or use web-based MD5 services. You should specify what you used; for example, give the URL.
You are given a sentence "Your_Last_Name" loved 7339
a. Generate a hash for the above sentence by selecting the last 4 bits from the MD5 hash
b. Perform a birth-day attack to change the sentence to "Your_Last_Name" hated 7339


4. You are given a password file containing 64 random passwords each of which are 6 characters long where each character can assume 128 different values.
If you were to attack this password file, what is the complexity of attack for the following scenarios:
a. Brute force attack to find Alice's password
b. Brute force attack to find somebody's password
c. Attack to find Alice's password with a dictionary containing 1024 chosen passwords
d. Attack to find any password with the same dictionary

Reference no: EM131110087

Questions Cloud

Why does the mirror image rule still apply : Why does the Mirror Image rule still apply in certain business scenarios? Why has the UCC largely discarded the mirror image rule, while it still persists in various parts of the common law
Calculate the implied price of each warrant for each : Calculate the implied price of each warrant for each of the bonds shown in the followingtable.
Identify the potential sources of conflict among managers : As the new Vice President of Operations for a chain of movie theaters, you have identified a high level of conflict among the managers of individual theaters about which theater has priority to show first-run films, which managers have more influe..
How is a proof by induction similar to conditional linear : How is a proof by induction similar to conditional linear recursion?
Describe a meet in the middle attack : 1. Answer the following questions brieflya. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.
What kind of case is this civil or criminal : Facts: Maria Kerkoulas owned the Pub Zone bar, frequented by many motorcycle gangs, and knew from her own experience and conversations with police that some of the gangs, What kind of case is this, civil or criminal
Describe the organizational structure of xecodynamics : Describe the organizational structure of Xecodynamics. What are the advantages and disadvantages of the current organizational structure? If Xecodynamics remains a standalone company, what indicators will signal to the leadership team that a chang..
Create a simple alice world with a few objects : Create a simple Alice world with a few objects of your choice, including a character that you create with hebuilder or shebuilder, and create both iterative and recursive methods to make the character walk to a target object.
Prepare jennifer brent corporation''s 2011 journal entries : Jennifer Brent Corporation owns equipment that cost $80,000 and has a useful life of 8 years with no salvage value.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Forensic challenge in mobile network

As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Outline security threats and vulnerabilities

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The topc and title is security threats and vulnerabilities

  Communicate together securely

There are two offices in different locations that must communicate together securely.

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  Assignment on securing the scene

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance inform..

  What is the entropy of the plaintext message

A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.

  Perform an attack against the cipher

Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?

  Search the internet for one instance of a security breach

search the internet for one instance of a security breach that occurred for each of the four best practices of access

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd