How many ciphertext blocks will be produced

Assignment Help Computer Network Security
Reference no: EM131477903

Information and Network Security Assignment

Q1. We consider the security services:

  • confidentiality,
  • integrity,
  • authenticity, and
  • non-repudiation

for a variety of simple protocols using symmetric or asymmetric cryptosystems, in a network environment where the two participants, Alice and Bob, are communicating in the presence of an adversary (attacker with malicious intent) Eve.

In the following scenarios for each of the four security services, describe whether or not it is achieved, and in either case give reasons.

(a) A → B : m||h(m)

(b) A → B : m||MAC(KAB, m)

(c) A → B : E(PUB, m)

(d) A → B : m||E(PRA, h(m))

(e) A → B : E(KAB, m||h(m))

Notation: m is the message, h() a cryptographically strong hash function, E() an encryption algorithm corresponding to the specified keys (symmetric for secret key, asymmetric for public/private key), MAC() is a message authentication code algorithm, KXY is a secret key shared between entities X and Y (symmetric algorithm), PUX is the public key and PRX the private key of entity X (asymmetric algorithm), || is concatenation function, X → Y specifies X sends to Y.

Q2. Alice and Bob agree to communicate privately via a protocol based on RC4, but they want to avoid using a new secret key for each transmission. Alice and Bob privately agree on a 128-bit key k. To encrypt a message m consisting of a string of bits, the following procedure is used:

(a) Choose a 16-bit seed (random value): r

(b) Generate the ciphertext c = RC4[h(r)||k] ⊕ m for the message, where h(r) is a cryptographically strong hash function that produces 128-bit message digest of the input

(c) Send the bit string h(r)||c

Answer the following:

(a) Suppose Alice uses this procedure to send a message to Bob. Describe how Bob can recover the message m?

(b) After how many messages should Alice and Bob change the secret key k to avoid RC4 key being repeated?

(c) Does increasing the bit size of the seed r make any difference in the previous part of the question? Explain why or why not.

Q3. Alice is using CFB mode of operation to encrypt a 16KB file to send it to Bob (1KB=1024 bytes).

642_Figure.png

(a) How many ciphertext blocks will be produced if Alice uses 8-bit CFB-DES (DES or Data Encryption Standard algorithm as the block cipher in Figure 1)?

(b) How many ciphertext blocks will be produced if Alice uses 16-bit CFB-AES (AES or Advanced Encryption Standard algorithm as the block cipher in Figure 1)?

(c) If there is an error in transmitted ciphertext block C1, how many plaintext blocks will be corrupted when Bob decrypts the file for 8-bit CFB-DES?

(d) If there is an error in transmitted ciphertext block C1, how many corrupted plaintext blocks when 16-bit CFB-AES is used?

Q4. Joe is an overworked and under-appreciated programmer at "This Secure World" company. He is asked to write an RSA key generation algorithm that performs better than the competition. To increase the efficiency of his algorithm he decides instead of generating two random prime factors for the modulus part of every RSA key pair, to reuse one of the previous factors and only generate one new random prime number for the new pair. For instance if the algorithm is generating x RSA key pairs the value of n for these keys would be as:

n1 = p1 x q1

n2 = p2 x q1

n3 = p2 x q2

n4 = p3 x q2

. . .

etc.

This has increased the efficiency of his algorithm by reducing the time required to test the primality of the randomly generated numbers and for the first time in quite a while he is praised by his supervisor for the surprisingly good performing algorithm. The company is going to embed this algorithm in all of their hardware and software products. You are tasked with evaluation of the security of Joe's approach by either approving or rejecting Joe's idea. For either case you need to provide a compelling argument for or against the explained approach. You can use the following four values of n to argue your case (if needed).

n1 = 6707746877476258769687006155346667312135818167434246494098858837590302781071

n2 = 10154884310969769321427673109695437709100362015315810046444550032439143118393

n3 = 16589923032327209104008156227749326050568372812838589709379351079078499097041

n4=1575487835625540131816354221478432115692476442918739107617773841300854393383

Q5. Eve (the adversary to Alice and Bob) intercepts the following communication between Alice and Bob:

  • Alice: Let's use Diffie-Hellman key exchange algorithm to share a secret key
  • Bob: Ok, let the prime be p = 21764036621498105787560256376487687131351962980131606042071496200654587822341 and the primitive root (generator) g = 5
  • Alice: Using your selected parameters my public key is YA = 7268937201146768929726789293736151850236699943837892054706367857897711254113
  • Bob: My public key is YB = 276234186282125810839720184172914090708234028484467282900291170147002076321
  • The rest of the communication is encrypted with KAB

(a) In the above scenario can Eve recover the shared secret key KAB using the captured messages? Explain what stops Eve from recovering the key or how she can calculate the value of the shared secret.

(b) Knowing the private key of Alice as XA = 278623657769 what is the value of KAB?

Reference no: EM131477903

Questions Cloud

Amount of ammonia-based fertilizer : The number of people this planet can support is largely determined by the amount of ammonia-based fertilizer that can be produced.
Discuss what the timbre of the synth adds to the sound : Use the internet to find another song that uses a Moog synth (you may also pick a track that uses a different kind of synth.
Acquisition of a subsidiary and consolidation entries : Preparation of a selection of consolidation elimination journals for year ending 30 June 2019, for an economic entity comprising a parent and subsidiaries plus working papers of a professional standard.
Determine the stopping distance : A 2200 kg car is moving at a speedof 30.0 m/s. Determine the stopping distance (in meters) if the brakes supply a force of 3500 newtons.
How many ciphertext blocks will be produced : FIT3031 Information and Network Security Assignment. How many ciphertext blocks will be produced if Alice uses 8-bit CFB-DES
Distance between wave crests : A water wave oscillates up and down once every 1.50 seconds. The distance between wave crests is 3.80 m. The speed of this wave __ m/s.
Calculate the amount of heat required : Calculate the amount of heat required (in calories) to raise the temperature of 4.8 kg of this material by 16 degrees.
Stationary hot air balloon : A rock mass of 6.00 kg is dropped from a stationary hot air balloon. Its potential energy at the top is 18,000 J.
Analyze and explain what is being done in the five areas : Analyze and explain what is being done in the five areas described above (team, job satisfaction, and stress management) in the company.

Reviews

len1477903

4/28/2017 8:29:40 AM

You can use the WolframAlpha web site to perform any calculation necessary for this assignment. A "Pro computation time" is not required to answer the questions and if you receive such message from the website it is likely that you are not performing the calculations right or the right calculations. In questions related to modular arithmetic do not write the answers in scientific notation, you need to provide all of the digits for any requested parameter (similar to provided values). Try small examples (from lecture notes or other resources) to make sure you are using the proper format for the web site and the correct equation before trying the given values. Only submitted PDF files are accepted. On various text editor software you can use "Save as PDF" option or use free converters to convert your file to PDF. Note: Do not submit a compressed version of the PDF file or a compression of multiple files. Such submissions may risk losing partial or complete assignment marks.

Write a Review

Computer Network Security Questions & Answers

  Contact information for next of kin

The company also keeps information about each driver, such as Social Security number, name, birthdate, and contact information for next of kin. Buses travel to only one state per visit.

  Security measures you would recommend to ssk software

Explain all Security measures you would recommend to SSK Software.

  Critically evaluate the system abc company uses

Critically evaluate the system ABC Company uses. Identify possible security risks and evaluate the relative threat posed by those risks. Identify and explain methods, if any, to address those risks.

  Define the perimeter security requirements for your network

Define the perimeter security requirements for your network. Research Internet and Web perimeter security models, and select a model that is appropriate for your network.

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to company users.

  Analyze the importance of having acceptable use policies

Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy.

  Briefly identify the compliance

Pick an organization from either the eCommerce sector (anyone trading in products or services using the Internet) or the Banking/Finance sector

  The author of your text suggests that the ability to

the author of your text suggests that the ability to connect to the internet via wi-fi is available everywhere bowles

  Integrative network design project

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project.

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  Why is the nfs option grayed out on the share protocols page

Why is the NFS option grayed out on the Share Protocols page and According to the Server Manager console, what roles are currently installed on the computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd