What are the vulnerabilities of this protocol

Assignment Help Computer Network Security
Reference no: EM132233849

Problem 1 -

a) Remember that in double DES, the encryption of a message M is done with two keys K1 and K2, C = EK2(EK1(M)). How does the meet-in-the-middle attack work?

b) Remember than in triple DES with two keys K1 and K2 a message M is encrypted as C = EK1(DK2(EK1(M))). What happens if K1 is equal to K2? That is, what will C be equal to?

c) Remember that DES encrypts blocks of 64 bits at a time. How do the modes of operation covered in class (eg. ECB, CBC, CTR) handle the encryption of a message whose bit length is not a multiple of 64?

Problem 2 -

a) Describe how RSA works. That is, how are the public and private keys generated, how is the message encrypted and how is the ciphertext decrypted?

b) Prove that RSA works. Assume M is a message pk = (e, n) denotes an RSA public key and pr = (d, p, q) denotes the corresponding private key. Then, if C = E(pk, M) is the ciphertext obtained by encrypting M with the public key, prove that D(pr, C)=M.

Problem 3 -

The key distribution protocol using public key cryptography (Key management and distribution lecture), has a fundamental problem. The protocol works as follows:

In step 1, Alice sends to Trent the message A → T: "Hi", A, B

In step 2, Trent replies with Bob's public key T → A: B, pkB

In step 3, Alice generates session key KAB. In step 4, Alice contacts Bob with the message A → B: E(pkB, KAB)

Bob decrypts this message with his private key prB and recovers the session key KAB. From then on, Alice and Bob encrypt their messages with KAB.

a) What are the vulnerabilities of this protocol? That is, show an attack where Mallory is able to convince Alice that he is Bob.

b) Show how to address these vulnerabilities. That is, describe small modifications to the above protocol that prevent Mallory's attack.

Problem 4 -

Remember public key certificates and revocation procedures.

a) Why do we need certification revocation protocols? Describe 3 cases where one would need to revoke the public key certificate of a user or company.

b) Describe how certificate revocation changes the protocol of verifying public key certificates. Specifically, describe all the steps that Alice needs to perform when she receives a certificate that claims to be the valid public key certificate of Bob.

Textbook - Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth), Author(s): Bruce Schneier. ISBN: 0471128457.

Reference no: EM132233849

Questions Cloud

Develop a well thought out analysis for the project : Develop a well thought out analysis for the project. Ensure the project instructions are read and used to develop a detailed and effective project with support
Current event or news item that pertains to sport management : Summary of a current event or news item that pertains to Sport Management.
Why is the company using a matrix organizational model : Pine Software LLC (PS) is a mid-sized software development firm located in suburban Chicago Illinois. The company was founded in 1992 and focuses on developing.
What do you recommend in the given situation : Imagine you are an HR consultant to the organization involved in this situation. The organization wants to be responsive and fair. What do you recommend?
What are the vulnerabilities of this protocol : What are the vulnerabilities of this protocol? That is, show an attack where Mallory is able to convince Alice that he is Bob
Avoid cultural insensitivity and promote inclusiveness : What sort of training programs would you recommend to avoid cultural insensitivity and to promote inclusiveness? Share your examples.
Describe seasonality forecasting and solve typical problems : Describe seasonality forecasting and solve typical problems. Describe what is trend forecasting and give examples on solving typical problems of it.
Sell high-quality whole bean arabica coffee beans : We purchase, roast and sell high-quality whole bean arabica coffee beans and related coffee products.
Performance measurement in organizations : Explain the importance of performance measurement in organizations.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a method caesarencode that takes a string message

Let's start by writing a simple method called charRightShift which takes a character and an integer n as inputs, and returns a character.

  Discuss about the use of protection operations

Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.

  Describe routing attacks

Briefly describe what routing attacks are. Provide two examples, highlighting their main characteristics. Can you explain what are routing attacks and show the main characteristics of this attacks.

  What types of malware might your smartphone be?

What threat might the app pose to your smartphone, should you grant these permissions and proceed to install it? What types of malware might it be?

  Analyze the security controls measures in given problem

Analyze the security controls measures that are needed to mitigate these vulnerabilities so that organizations will adopt wireless technologies.

  What are some products or services that utilize rsa

Provide three examples and explain how they make use of the RSA encryption technology.

  Formulate a digital forensics process

Write a guide on how to load a VHD file and what strategies should you use? Which acquisition method should you use?

  Compare and contrast des and public key encryption

Describe how asymmetric encryption and decryption work. What is key management? How does DES differ from 3DES? From RC4? From AES?

  Details of a customer order in a file

You will need to store the details of a customer's order in a file so that you have a record of it and so that you can retrieve it for later use. Numerous errors can occur during input or output operations. There are two fundamentally different wa..

  Problem regarding the cyber-attack

This exercise is to identify and characterize assets. Imagine there is a severe natural calamity in your area and your personal vehicles have been rendered immobile. The local mayor is running school buses on their routes to evacuate residents and..

  Ethics associated with future global cyber security issues

Interconnectedness Cybersecurity Poses to Society and the Pursuit of Commerce - What three policy points should be included in a proposed model for a GLOBAL cybersecurity policy that will help mitigate the effects of cyber-warfare, cyber-crime, and..

  Design secure wireless networks

Determine and explain the steps by which you can create a secure wireless CCTV system from Raju's phone - Draw a diagram of the setup.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd