Formulate plans for how to approach the immediate issue

Assignment Help Computer Network Security
Reference no: EM13313401

Scenario:  Stella changes banks following her troubles with SHB. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system. She creates a key pair and supplies Fiona, an officer of UST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a floppy disk which she keeps locked in a wall safe at her home. In turn, Fiona gives Stella access to a key server maintained by UST so that she can readily obtain Fiona's current public key {eF, nF} whenever she needs to communicate securely with Fiona.

Things are fine for several months until Stella sends Fiona a message m asking about current interest rates on Certificates of Deposit issued by UST. As shown below, she enciphers the message first, and then signs it:

1476_mod 1.png

A few days later, Stella received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Fiona transferred the money out of Stella's account into an account of her own in a bank on the Caribbean island of Nevis. When reached via long distance in Nevis, Fiona produced a message g from Stella saying: "Thanks for your excellent service, Fiona. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Stella."

Stella files suit against Fiona, UST and the government of the Nevis, claiming that the message was a forgery sent by Fiona herself, asking for triple damages for pain and suffering. Fiona has responded by claiming that all procedures were followed properly and that Stella is filing a nuisance suit.

You have been employed by UST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Stella issue. You obtain Fiona's private key from the UST server, and the cipher text c, and calculate 

1286_mod 2.png

Your report to the UST Board of Directors should address the following issues:

  • From the facts as presented what can be determined about Stella's intentions to make Fiona a gift of $1,000,000?
  • What is the significance of Nevis Island?
  • What is the significance of Stella's message to Fiona asking for interest rates?
  • Assuming UST wishes to continue using RSA as its cryptographic system, what UST and Stella could have done to protect against this controversy arising?

Your report should clearly address these issues including recommendation for the Stella's suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

Reference no: EM13313401

It project management

Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another

Compare and contrast two natural disasters

Describe three factors that help to influence our nation's focus on natural or man-made disasters - what issues have been raised concerning some of the authorities granted to

Provide a report - an industry perspective of cyber security

Brief introduction to the topic, stating clearly the name and credentials of the presenter and brief overview of what the lecture was about and then setting out the inter

What is meant by multi-modal biometrics for access control

What is meant by "Multi-modal Biometrics" for access control. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biom

Loss of privacy

Loss of privacy - define, give examples; explain two examples in detail. Discuss local, global, societal issues. Give a personal prediction on major privacy issues in the ne

Threats to a company intellectual property

After looking at your network security, structure there are three specific threats that we will focus on that could have a Hugh impact on your business intellectual property

Analyze the necessity for different protocols

Identify common frequency bands used in current RF communications. Analyze the necessity for different protocols in wireless communications. Compare the challenges of using sa

An information security risk assessment for the organisation

Based on the case study supplied,write a report that includes, An Information Security Risk Assessment for the organisation (Wolftech). A good answer will identify threats, vu


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd