Perform a risk assessment on your design

Assignment Help Computer Network Security
Reference no: EM131311269 , Length:


Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission.


Issuing a Check:

1. Payee (A) will contact the bank requesting the issuance of $ amount check made payable to (B).

2. Bank responds by sending the payee a check receipt CR, where:

CR = RSA( PuA , check )

check = RSA( PuC , token )

token = AES128( KeyBank , amount )

3. Payee (A) receives the check receipt from the bank, extract the check from it and pass it to the receiver (C).

4. The receiver extracts the token from the check and pass it to the bank encrypted with its own private key to collect the money.

From C to Bank: RSA( PrC , token )

Given the following information about A, C, and the Bank:

For A:

Modulus (n):




Public Exp. (e): 010001

Private Exp.(d):




For C:

Modulus (n):




Public Exp. (e): 010001

Private Exp.(d):




For the Bank:

AES128 Key: C1D0F8FB4958670DBA40AB1F3752EF0D

Calculate the messages sent in steps 1 to 4 if A is sending $ amount equals to your NYIT ID to C.


Propose an electronic cash transfer system (similar to Bitcoin) that is completely decentralized. Illustrate how funds transfer can take place. Show the different system components and the cryptographic techniques used to implement your design.

Perform a risk assessment on your design and compare it to existing eCash transfer systems.

Verified Expert

This assignment make the use of the RSA and AES128 encryption and the decryption technique. It also contain the electronic cash transfer method technique and its risk.

Reference no: EM131311269

Research the debate over activex controls

Using the Web, research the debate over ActiveX controls and analyze Microsoft's security design. Is it strong enough? What security breaches have occurred in the past reg

Explain common organizational security threats

Create either a PowerPoint presentation, or a training manual, that will help get the team to think about security. This training document should cover the following key areas

Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when u

How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns and explain how you would describe to the management team the difference between a compliance a

What was the volume of digital evidence

Select a real world event related to Cybersecurity. This could be a crime, a well-documented breach or intrusion, or an act of cyber warfare/espionage.Needs to be 10 pages.

Security issues in integrated networking infrastructure

You are to select any one scenario for your report in consultation with your tutor. Your report on the scenario should be between 3500 and 3800 words. The emphasis of the re

What is the single most important asset of security program

What are the benefits if personnel in security management develop skills as educators for their organization's security? Analyze and explain your point of view. Why are secu

What are the risks of implementing this technique

list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?



12/17/2016 5:26:38 AM

Thank you for an awesome work on my paper. The paper contained all that I required and I couldn't have requested a superior occupation! I will keep on using your service for my future tasks. Much obliged to You Again!


12/17/2016 5:25:11 AM

Cryptography Thanks for your swift reply and great service offered. I would like to negotiate the price though as I am finding it very difficult to fit this amount into my budget. Hope you the do the best as always. please provide the NYIT Id for part 1.


12/14/2016 1:39:28 AM

Propose an electronic cash transfer system (similar to Bitcoin) that is completely decentralized. Illustrate how funds transfer can take place. Show the different system components and the cryptographic techniques used to implement your design.

Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd