Explain concisely and clearly your protocol a and b

Assignment Help Computer Network Security
Reference no: EM131299364

PROJECT

Let's suppose that Alice and Bob have each a number n_A and respectively n_B between 1 and 10 and they want to know if they have the same number or not. The problem is that in case they don't have the same number, they don't want to reveal to the other party any other information. They can solve this problem with thefollowing protocol that uses 10 boxes that have a small opening and two pebbles. Each box also can be locked and opened with a key. We assume that Alice has the keys of all boxes.

1. Alice enters alone in the room where the boxes are and she inserts a pebble in the n_A-th box.

2. Bob enters alone in the room where the boxes are and he inserts a pebble in the n_B-th box. He cannot open any of the boxes because the keys are in the other room.

3. Alice enters and opens the n_A-th box. If it has two pebbles, it means that n_A = n_B, and if it has a single pebble, then n_A is not equal to n_B. Alice tells Bob whether n_A and n_B are equal or not.

Note that we assume that Alice is honest and she follows the protocol's rules (otherwise she could open all boxes and see what n_B is).

(A) Your first task is to design a protocol (name it Protocol A) that has the same functionality as the one above, but instead of locked boxes, uses some encryption scheme, and email for communication.

(B) Your second task is to design protocol B using encryption schemes and email communication, in which Alice and Bob need to determine whether n_A + n_B>= t, where t is some threshold number. As before, Alice and Bob will not learn anything else besides that the sum of their numbers is at least T, or not.

In both protocols, you can assume that Alice and Bob are honest, and follow the rules of the protocols designed by you.

Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.

Reference no: EM131299364

Questions Cloud

Represent situation of restaurants with an e r diagram : Each menu has many menu items, and items can appear on multiple menus, and with different prices on different menus. Represent this situation of restaurants with an E-R diagram.
Provide another recommendation : Provide another recommendation.- Just conduct more research on the area of expanding menu. Read the file for detailed instruction.
Describe national trends that will affect the brand : Give a brief description of the company, the selected brand, its functionality and/ value offering.- Describe national trends that will affect the brand.
What problems does a company face when someone hacks data : What problems does a company face when someone hacks into their data? Identify the legal aspects of loss of customer personal information? Compare and contrast the advantages of tables and views.
Explain concisely and clearly your protocol a and b : Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.
Do you object to any of these course policies : Students are certainly somewhat dependent on their teachers. Do you object to any of these course policies? If so, which ones, and why?
Discuss occurrence or breach or disaster that has happened : Discuss the occurrence or breach or disaster that has happened. Perform a risk assessment and threat identification section for the organization that you have chosen, as RISK ANAYSIS AND THE.
Describe national trends that will affect the brand : Describe national trends that will affect the brand.- Describe the brand's competitive advantage in terms of quality, price, selection, location, and service.
Write c program that calculates and prints average of grades : Write a C program that calculates and prints the average of several grades entered by the user. The program should first prompt the user to enter the number of grades to process.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Design a network or network component

Students are to design a network or network component using a design tool (example: Visio or CAD). Required is a visual representation of this network along with a document describing all aspect of the network design including product selection.

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  Explain importance of explicit enterprise security policies

Identify the predominant electronic and physical threats to communications networks. Explain the importance of explicit enterprise security policies and procedures. Describe potential threat detection and protection techniques. Explain the importance..

  Ethics or values within the hacking subculture.

Write a 1-2 page essay defining and showing examples of hacking and its subculture. Do hackers have ethics or values? If so, give examples of ethics or values within the hacking subculture.

  Internet technology- marketing and security

Internet Technology, Marketing, and Security

  Inherent flaws in the department of homeland securitys

In your opinion, what are the inherent flaws in the Department of Homeland Security's Blueprint for a Secure Cyber Future? Explain your answer

  Famous financial corporation

Your submission should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insight relating directly to the topic. Your response should reflect scholarly writing and APA stan..

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

  Do you have any security concerns for using virtual networks

Virtualization has become a key player in our networking world these days. Another important term is the virtual private network (VPN). Are the two terms (virtualization and VPN) related? Discuss and give examples. Do you have any security concern..

  Implementing information systems security policies

Describe the roles and responsibilities of those implementing information systems security policies.

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd