Design an algorithm to achieve the byzantine agreement

Assignment Help Computer Network Security
Reference no: EM13326779

1) An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname and your favorite color. Such schemes need careful evaluation of their usability and effectiveness using the tools of applied psychology. Design such a password protocol and evaluate its usability and effectiveness. (A verbal text description is enough.) (500 words)

2) Analyze one of the commonly used password management protocol (e.g., Microsoft Outlook password management), what is the weakness of this protocol? (300 words)

3) Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

Reference no: EM13326779

Questions Cloud

What is the present worth of the following income strings at : What is the present worth of the following income strings at an interest rate of 12%? (All cash flows occur at year end.)
Compute the power necessary to stack the boxes : en boxes, each 21.0 cm high and weighing 235 N, initially are all side by side on the floor. Compute the power necessary to stack the boxes
What is the purpose of a standard operating procedure : What is the purpose of a standard operating procedure (SOP) in digital forensics? You might also think of this as a systematic approach to the investigation. List five activities that should be in every SOP for digital forensics.
What is the probability that any of the offspring produced : In fruit flies, the gene for eye color is sex-linked (X-chromosome) and red eye color is dominant over white. The gene for body color is an autosomal trait with gray dominant over black.
Design an algorithm to achieve the byzantine agreement : Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)
What percentage of offspring is expected with the genotypes : A third gene, designated C, is located 15 mu from B and 5 mu from A. A parental generation consisting of AAbbCC and aaBBcc individuals were crossed to each other. The F1 heterozygotes were then test crossed to aabbcc.
Income statements for each company : Write a paragraph describing the difference between the two companies for 3 of the ratios calculated and prepare common-size and trend percentages for the income statements for each company.
How to design an improved interactive password system : Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.
Explain what is the problem with the prediction : The human genome project initially predicted 100,000 genes due to the number of proteins found through western blots. When near completion, computer analysis of the sequence predicted only 30,000 genes.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  Security vulnerabilities of vc

single access point (AP), wireless network, CSMA/CA, goals of information security, Wireless LANs, wireless hacking process, Wired Equivalent Privacy (WEP), Open System Authentication and Shared Key Authentication, Initialisation Vector (IV), RADIU..

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Use a balanced scorecard system

Why is it reasonable to use a balanced scorecard system to measure staff performance? How does this approach mitigate concerns about measurement dysfunction?

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

  Question about program consistency

Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd