What is the decrypted plaintext

Assignment Help Computer Network Security
Reference no: EM13328967

Part 1: Short Answer.  Answers should be no longer than a few sentences.  "Bulletized" lists or small tables may be used for the sake of brevity.  The point value of each question appears at the beginning of the question. Partial credit may be given if work is clearly shown.

1.       A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

2.       Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,... , pn} and corresponding ciphertext = {c1, c2,... , cn}. Suppose the encryption function is ci = pi + 6 (mod 26).  If you receive the ciphertext message ASAIMXGJAGZKYINUUR and are asked to recover the plaintext. answer the following questions: a). What is the decryption function, b). What is the decrypted plaintext? c). What are some weaknesses of this cipher?

3.       You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739. You have secretly picked the value SA = 5.You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 113.  What is the value of your shared secret key?

4.       Bob believes that he has come up with a nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter's position in the alphabet, i.e., VA = 1, VB = 2, ..., VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 ...x VChar N) mod(26). Bob uses this function to send a one-word message, LAYER, to his banker Bill, along with his calculated hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

5.      Consider the following plaintext message: FAIN 460 9043 IS A GRADUATE COURSE.

a.        If this message is sent unencrypted and successfully received, what is its entropy?

b.       If this message is encrypted with DES using a random 56-bit key, what is the encrypted message's entropy?

6.      A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function.  (i.e,, C = P XOR Key). This process can be expanded to double-XOR or even triple-XOR (i.e., C = P XOR K1 XOR K2). Assume that the two pseudorandom bytes are  10110101 (K1) and 01110010 (K2) and the double-XOR is used,.

a.        What is the ciphertext (in binary form) generated by the encryption of the character T (Please show your work.)  

b.       What is the plaintext for the ciphertext 10000001? (Please show your work.)

7.        The following ciphertext is a monoalphabetic ciper:

PELCGBTENCUL VF GUR NEG BS FRPERG JEVGVAT VG VAIBYIRF GENAFSBEZVAT VASBEZNGVBA VAGB NCCNERAGYL HAVAGRYYVTVOYR TNEONTR FB GUNG HAJNAGRQ RLRF JVYY OR HANOYR GB PBZCERURAQ VG

Decrypt this message, and briefly describe your cryptanalysis methodology.  In particular, list features of the ciphertext that hindered or helped your decryption process.

8.      An organization has 100 members.  It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages. Explain the details of each question below:

a.       What is the total number of keys that are required for the organization if symmetric cipher is used? Why?

b.       What is the number of keys need to be kept by each member are required for if symmetric cipher is used? Why?

c.       What is the total number of public key(s) and private key(s) are required for the organization if asymmetric cipher is used? Why?

d.       How many public key(s) and private key(s) need to be kept by each member if the asymmetric cipher is used? Why?

9.       Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive. Alice has decided to use RSA as her encryption algorithm.  As the cryptographic consultant for the project, do you think this is a good choice or not?  You should state the reasons for your answer, and suggest an alternative if you do not think she made a good choice.

10.    Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

11.   What is the purpose of the Diffie-Hellman algorithm? What are its major strength(s) and weakness(es)?

12.   Using RSA, let p = 17, q = 13 and e = 5.  What is the complete private key?

13.    Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit key.  The company decides to conduct a "challenge" to crack an encrypted message using a brute-force approach.  The average time to crack the message is found to be 1 hrs.  As a result, Encrypt-It-Rite decides to increase the key length by 8 bits, from 64 to 72 bits.  They then conduct another challenge.  What average cracking time would be expected for the new, improved cipher? If Encrypt-It-Rite would like to increase the average cracking time to at least 100 years, what will be the minimal length of the key?

14.   A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.  A crypto device encrypts each message into 20 bits of ciphertext.

a.       What is the entropy of the plaintext message?

b.      What is the entropy of the ciphertext message?

c.       Is this a good cryptosystem? Why or why not?

15.   Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value? Verify your answer.

16.  Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

a.        Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob.  You should also include any steps taken by Bob that allow him to read the message.

b.       Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that Bob could be confident was sent by Alice.  You should also include any steps taken by Bob to determine whether or not Alice actually sent the message.

c.        Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob, and that Bob could be confident was sent by Alice.  You should include any steps taken by Bob to read the message, or to determine whether Alice actually sent the message.

17.  Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob's public key.  Bob downloads a key from the key server which Eve claims is Alice's public key.

a.        Given that Alice and Bob both assume that they have the correct public keys for the other party, and assuming that Eve can intercept any messages passed between Alice and Bob, is there any way that Eve can read the encrypted communications between the two parties?  If so, how could she do it, and would Bob or Alice know that Eve was reading their messages?

b.       What steps could Alice take to ensure that the public key which Eve claims belongs to Bob is actually correct?

Part 2: Essay Question.   Maximum length: three (3) pages (double spaced).  Use APA format for in-line citations and references. 

Compare and contrast symmetric and asymmetric encryption algorithms. Your response should include a brief overview of the cryptographic basis for each type of algorithm, and a comparison of their relative strengths and vulnerabilities. Describe how a hacker might go about cracking a message encrypted with each type of algorithm.  Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

Reference no: EM13328967

Questions Cloud

What is the speed of the target body : A projectile of mass 2.06 kg approaches a stationary target body at 7.70 m/s. What is the speed of the target body
How multi-national corporations deal with translation : How Multi-National Corporations deal with translation exposure, transaction exposure and economic exposure
How full-absorption costing can be abused by management : Explain how full-absorption costing can be abused by management to misstate financial results and explain how CVP analysis may be helpful in evaluating whether it will be smart to buy a new machine that would reduce labor costs by 60%.
Compute the present value of a 100 dollars cash flow : Present value: Compute the present value of a $100 cash flow for the following combinations of discount rates and times r= %8 , t=10 years
What is the decrypted plaintext : A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?
What is the monthly payment that is beyond the means : You have found a Toyota Sienna priced at 34,400. The dealer has told you that if you can come up with a down payment of 3,300, he would be willing to finance the balance at an EAR of 5.65%.
Advantage of corporations relative to partnerships : Which of the following is an advantage of corporations relative to partnerships and sole proprietorships and group of users of accounting information charged with achieving the goals of the business
Compute the quoted or risk-free-rate of return for year 8 : Suppose the real risk-free rate, r*, is 2% and investors expect inflation to be 4% next year, 5% the following year, and 7% per year thereafter. Assume the MRP is zero for Year 1 and increases by 0.1% each year.
With what speed does the projectile leave the barrel : A toy cannon uses a spring to project a 5.34 g soft rubber ball. The spring is originally compressed by 5.09 cm and has a force constant of 7.98 N/m. With what speed does the projectile leave the barrel of the cannon

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  What issues can arise during admission of digital evidence

The DQ response should be between 500 words, and grammar and spelling are important. Please make sure to proofread carefully!

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Explain protocol for sending encrypted message

Consider following protocol for sending an encrypted message from Alice to Bob in presence of Key Distribution Center (KDC).

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  Identify the critical business functions

Identify the Critical Business Functions (CBFs) a midsized organization would need to restore after a catastrophic failure occurs, and suggest the ways the organization would determine the order in which it restores its CBFs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd