Security vulnerability

Assignment Help Computer Engineering
Reference no: EM131689

Question 1. Alice and Bob are sending a message m to each other

a) Give one method to achieve confidentiality for m.

b) Give one method to achieve integrity but NOT confidentiality for m

Question 2. Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw a diagram only to describe the message exchange and the content of each message.

Question 3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Show the entire mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Show the entire mathematical steps)

Question 4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Assume the encryption is absolutely unbreakable.

a) Can B be reasonably sure that the message is generated by A? Why?

b) If B shows another person C that B can use the key k to decrypt the message, can C be reasonably sure that the message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C can be reasonably sure that the message is indeed generated by A?

Question 5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following questions:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If the length of the key is doubled, what is the amount of time required to decrypt the message with brutal force? Why?

Question 6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts the cipher text and retransmits c1-c3-c3-c4, what will be the "plain text" blocks being decrypted into?

Reference no: EM131689

Questions Cloud

Financial accounting system : How can the conventional financial accounting system be made to serve the purpose of operational control
Implement the delivery company : Implement the delivery company using the classes given in the class diagram above.
Write a complete c++ program : The main program will read in a parameter value n (read this in main). Then it will call a function read2arrays (details below) to read lists of grades into two arrays, which the main program will call test1 and test2 (or some other names of your ..
Prepare an arbitrary sinusoidal waveform : Create a program to compute the derivative of an arbitrary input function, with arbitrary duration and arbitrary limits
Security vulnerability : What is the security vulnerability of this solution
Using the irvine32 library functions : Create 32 random points which have (x, y) co-ordinates
Prepare a planning memo for the tlc engagement : Prepare a planning memo for the TLC engagement based on the information provided in the case.
Evaluate the gross profit : Evaluate the gross profit
Overview of the situation/accounting issue : You will be asked to address a accounting failure from AMERICAN INSURANCE GROUP. Overview of the situation/accounting issue

Reviews

Write a Review

Computer Engineering Questions & Answers

  Application to computer science

Find the matrices that represent the relations.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Write an essay on wifi performance

Write an essay on WiFi performance

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Calculate the component voltages

Input voltage will be a step voltage that is 0 volt before time t = 0 and V in

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Software engineering and microprocessor systems

Software is required for a simple house burglar alarm system.

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Encipher a message using a keyword

The first program will encipher a message using a keyword and second program will decipher a message using a keyword.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd