COSC2536 Security in Computing and Information Technology

Assignment Help Computer Network Security
Reference no: EM132387164

COSC2536/2537 Security in Computing and Information Technology Assignment

School of Science - RMIT University, Australia

Learning Outcomes - This assessment is relevant to the following Learning Outcomes:

  • understand applications of privacy preserving computation techniques, digital signatures and data hiding techniques.
  • develop privacy preserving applications and libraries using any programming language of your choice.
  • understand the life cycle and design principles of Blockchain and Cryptocurrency applications.
  • analyze the strength and limitations of security protocols.
  • design new security mechanisms and protocols for any small and large-scale applications.
  • Implementing a simple secure system
  • Critically analyze and evaluate the security of computing and IT systems on a practical level and privacy related issues in computing.

Q1. Privacy Preserving Online Voting System

Show the encryption, homomorphic computations and decryption processes.

Q2. Digital Signatures

Q2.1 [RSA Signature Scheme]

Suppose Bob (the sender) wants to send a message m=123456 to Alice (the receiver). However, before sending the message he would like to sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses parameter p = 5563 and q = 3821, and chooses a suitable public key parameter e=9623. How would Bob sign message m=123456? How would Alice verify the signed message from Bob?

Q2.2 [ElGamal Signature Scheme]

Suppose Bob (the sender) wants to send a message m=4567 to Alice (the receiver). However, before sending the message he would like sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using ElGamal encryption algorithm and sends the public key to Alice. Bob chooses p= 7331, g=3411, x=41. How would Bob sign message m=4567? How would Alice verify the signed message from Bob?

Q2.3 [RSA Signature Scheme for Text Message]

Suppose Bob (the sender) wants to send a large text message M to Alice (the receiver). You should download the text message file "Message.txt" from the CANVAS. The text message M is as follows:

Cryptocurrencies continue to grow in price and size. Knowledge about Bitcoin, Litecoin, Ethereum, and others has spread through the entire world. Cryptocurrencies are providing such features and tools that simplify our lives. They are changing the way things work. Some people fear the changes. But changes are not always bad. Cryptocurrencies are modifying our lives, and the way industries develop. There's no doubt that cryptocurrencies are disrupting and affecting the global economy in many ways.

Before sending the message, Bob generates a hash h(M) of the text message M using MD5 hash algorithm, and converts h(M) into integer message m. Then, he signs the m and sends it to Alice. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses the following parameters:

p = 278966591577398076867954212605012776073

q = 467207331195239613378791200749462989467

Bob chooses a suitable public key parameter e=41. How would Bob sign message M? How would Alice verify the signed message from Bob?

Q3. OpenSSL and IPFS

Assume that an owner of a particular file, say Alice, wants to share the file to her colleague, say Bob. In other words, Alice is the sender and Bob is the receiver. They use an IPFS based file repository and OpenSSL for providing security. Alice and Bob perform several operations using OpenSSL and IPFS to ensure secure file sharing. Throughout the processes, AES symmetric-key and RSA public-key encryption algorithms of OpenSSL are used. You should choose your own file (e.g. a text file with your student number and name) and AES encryption key (e.g. 123456789).

The scenario is illustrated in the Figure-Q3 below. You are expected to show the required OpenSSL and IPFS commands sequentially for each step stated below. Please provide screenshot of the outcome for each command.

Q4. Report Writing or Implementation

Q4.1 [Writing Report on Blockchain]

Choose a system where Blockchain Technology can be applied. Write a well-organized report on how the Blockchain Technology can impact your chosen system. You may consider the followings scenarios to prepare your report:

  • Blockchain based Financial System
  • Blockchain based Real Estate Management Systems
  • Blockchain based Healthcare
  • Blockchain based smart city
  • Blockchain based smart manufacturing
  • Blockchain based supply-chain
  • Blockchain based E-Commerce
  • Blockchain based IoT applications

In this report, you expected to provide necessary background of the system you choose and the blockchain technology. Presenting an innovative scenario is highly appreciated. Most importantly, a detail system design should be presented.

Q4.2 [Implementing a Blockchain System]

In this question, you are expected to implement a blockchain system a scenario stated in Q4.1. You are allowed to use any programming language or scripting language such as Java, PHP, Python, JavaScript, etc.

Your implementation must have a good graphical user interface (GUI). Upon completion of the implementation, you are expected to: Create a short report containing the implementation details and user instructions.

Q4.3 [Implementing a Privacy-preserving Online Voting System]

In this question, you are expected to implement an online voting system using the concept of Paillier encryption scheme based privacy-preserving computation (refer to the scenario stated in Q1 of this assignment). You are allowed to use any programming language or scripting language such as Java, PHP, Python, JavaScript, etc. Your implementation must have a good graphical user interface (GUI). Upon completion of the implementation, you are expected to: Create a report containing the implementation details and user instructions.

Q4.4 [Implementing a Secure File Sharing System]

In this question, you are expected to implement a secure file sharing system using the concept of the scenario stated in Q3 of this assignment. You are allowed to use any programming language or scripting language such as Java, PHP, Python, JavaScript, etc. Your implementation must have a good graphical user interface (GUI).

Q5. Analyzing Security of Authentication Protocol

The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptography algorithm that is used here is secure. Given that the following protocol does not provide mutual authentication. Give two different attack scenarios where Trudy can convince Bob that she is Alice. Briefly explain each attack scenario performed by Trudy with proper diagram which on the protocol.

Attachment:- Information Technology Assignment Files.rar

Reference no: EM132387164

Questions Cloud

Residential segregation and wealth inequality : How did governmental housing policies institutionalize residential segregation and wealth inequality?
Leading a high school counseling group : You are about to begin leading a high school counseling group, and the policy of the school is that any teacher or counselor who becomes
Write a small program using JAX-WS : Write a small program using JAX-WS to do the above. Use a command line interface for the customer and for the server
BC 16 English for Professional Development and Communication : BC 16 English for Professional Development and Communication Assignment help, MAJAN UNIVERSITY COLLEGE, Business Report - FACULTY OF BUSINESS MANAGEMENT
COSC2536 Security in Computing and Information Technology : COSC2536/2537 Security in Computing and Information Technology Assignment Help and Solution, RMIT University Australia - Privacy Preserving Online Voting System
What does it mean for a technology to be gendered : What does it mean for a technology to be "gendered"? Can you provide an example of an information technology which has been "gendered" in a particular way?
Should niqab allowed in court : Mr. Justice Louis LeBel and Mr. Justice Marshall Rothstein - said a niqab should never be permitted in the witness box
Practice modelling and simulation assignment : Practice Modelling and Simulation Assignment help and solution, Plot input and outputs of the new system and comment on the behavior of the system.
Why is the united states highlighted : Why is the United States highlighted as being in genocide denial?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd