Cryptographic data objects and authentication protocols

Assignment Help Computer Network Security
Reference no: EM132849890

Cryptographic Data Objects and Authentication Protocols

Answer ALL of the following EIGHT tasks.

Task 1 - Cryptographic Data Objects
B has just received the following message, which represents a cryptographic data object:
{(
{(KPbB)KPrS mod KPbS}K1,
{|(NB, NA , {{({K2}KPbB, NS)}(G1)KPrA mod NA}K1, {|{( {G3}(KPbA)KPrS mod KPbS, G2)}K1|}KPrB)|}KPrA
)}KBS
The following explains various terms in this object and some of the abbreviations used:
- {M} K represents the encryption of some message/data M using the key K
- {|M|} K represents the digital signing of some message/data M using the key K
- NX represents a nonce (i.e. a fresh and possibly random number used once only) generated by X
- KpbX represents the public part of the key pair presumably owned by X
- KprX represents the private part of the key pair presumably owned by X
- KAB represents a symmetric key shared between A and B
- K (or K1, K2, K3 etc.) represents some arbitrary key with no assumptions about its scope
- M represents some alphanumeric/textual message with no assumptions
- G1, G2, G3 etc. are prime numbers
which of the following sets of keys, nonces, numbers, and alphanumeric/textual messages "best" represents B's knowledge , after B applies any number of possible cryptographic operations to the object above, and assuming that B already has access to key K1 and the public key of any agent:
a) KBS, G2, KPrB
b) {(KPbB)KPrS mod KPbS, G2, KBS, KPrB, {(KPbB)KPrS mod KPbS}K1, NA, NB
c) NA, NB
d) NA, NB, KBS, KPrB
e) {(KPbB)KPrS mod KPbS}K1, {|(NB, NA, {{({K2}KPbB, NS)}(G1)KPrA mod NA}K1, {|{({G3}(KPbA)KPrS mod KPbS, G2)}K1|}KPrB)|}KPrA, NA, NB, KBS, KPrB, {(KPbB)KPrS mod KPbS
f) G2, NA, NB, G1, KBS, KPrB
g) (KPbB)KPrS mod KPbS, NA, NB, G2, KBS, KPrB
h) (KPbB)KPrS mod KPbS, (G1)KPrA mod NA, NA, NB, G2, KBS, KPrB
i) (KPbB)KPrS mod KPbS, G3, G2, KBS, KPrB
j) (KPbB)KPrS mod KPbS, NA, NB, G2, KBS, KPrB, G3, (KPbA)KPrS mod KPbS
k) NB
Explain your answer.

Task 2 - Authentication Protocols
Consider the following 4-message protocol:
1. A → S: (B, {(A, K1) }KpbS)
2. S → B: A
3. B → S: (A, {( B, K2) }KpbS)
4. S → A: (B, {K2}K1)
Which of the following statements is true, at the end of the protocol, and with regards to the purpose of the protocol:
a) Both A and B establish a session key K2, and B is sure of A's identity
b) Both A and B establish a session key K1, and B is sure of A's identity
c) Both A and B establish a session key K1, and A is sure of B's identity
d) Both A and B establish a session key K1, and both B and A are sure of each other's identity
e) Both A and B establish a session key K2, and A is sure of B's identity
f) Both A and B establish a session key K1
g) Both A and B establish a session key K2
h) Both A and B authenticate each other by knowing each other's identities
i) A ends up knowing B's identity
j) B ends up knowing A's identity
k) None of the above
l) All of the above
Explain your answer.

Task 3 - Non -Repudiation and Anonymity Protocols
For the Zhou-Gollman non-repudiation protocol discussed in the lecture on "Non -Repudiation and Anonymity Protocols", which one of the following statements is false:
a) At time point 4, both A and B can produc e evidence to prove that they received K
b) At time point 2, both A and B can produce evidence to prove that they received a signed message from the other party
c) At time point 0, S cannot prove anything
d) At time point 3, B cannot produce evidence to prove that A has access to key K
e) At time point 1, A can prove that B is alive
f) At time point 4, S can prove that A is alive
g) At time point 3, S can produce evidence that that A has access to key K
h) At time point 0, A is alive
i) At time point 2, A can produce evidence to prove that B is alive
j) At time point 4, the protocol terminates
Explain your answer.

Task 4 - Forwards Secrecy Protocols
Consider the following 4 -message protocol:
1. A → S: ( B, {(A, K1)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → A: (B, {K2}K1)
Assume three runs of the above protocol, that we call P1, P2 and P3. If after completion of run P3, K1 is compromised, i.e. it is leaked to some external intruder, how would this impact the forward secrecy property of K2 for all the three runs of the protocol P1, P2 and P3? Choose the right answer:
a) Compromising K1 in P3 compromises every other key in all of the three runs of the protocol
b) The secrecy of P3.K2 is not compromised, and therefore P2.K 2 and P1.K 2 would remain secret
c) Compromising K1 in P3 compromises P3.K 2, and therefore, every other previous version of K1 and K2 are also compromised
d) The secrecy of P3.K 2 is compromised, but P2.K 2 and P1.K 2 would remain secret since K1 is refreshed after each run, therefore P3.K1 is different from P2.K 1 and is different from P1.K1
e) Even though K1 is compromised in P3, K2 is not compromised in any of the three runs
Explain your answer.

Task 5 - Attacks on Security Protocols
Consider the following 4 -message protocol:
1. A → S: (B, {(A, K1)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → A: (B, {K2}K1)
And the following attack trace:
1. I(A) → S: (B, {(A, K)}KpbS)
2. S → B: A
3. B → S: (A, {(B, K2)}KpbS)
4. S → I(A): (B, {K2}K)
Which one of these changes to the protocol messages would fix the attack trace above, such as the attack then becomes impossible:
a) 3. B → S: (A, {(B, {K2}KpbA)}KpbS)
b) 4. S → A: (B, {K2, A}K1)
c) 2. S → B: {A}KpbB
d) 2. S → B: B
e) 3. B → S: (A, {(B, {K2} KprS)}KpbS)
f) 1. A → S: {(B, A, K1)}KpbS
g) 1. A → S: (A, {(B, K1)}KpbS)
h) 4. S → A: (B, {K1}K2)
i) 4. S → A: (A, B, {K2}K1)
j) 2. S → B: A, B
Explain your answer.

Task 6 - Mutation and Type-Flaw Attacks
Consider the following 4-message protocol between A and B, where (N+1) represents the increment of N:
1. A → B: (A, {NA}KAB)
2. B → A: {(NA+1, NB)}KAB
3. A → B: {NB+1}KAB
4. B → A: {(K'AB, NA)}KAB
Which of the following mutations to messages of the protocol above, would constitute a harmful attack:
a) 1. A → B: (C, {NA}KAB)
b) 1. A → B: ({NA}KAB, A)
c) 4. B → A: {(KAB, NA)}KAB
d) 4. B → A: {(K'AB, NB+1)}KAB
e) 3. A → B: {NB+1}KpbB
f) 2. B → A: {(NA+1, NA)}KAB
Explain your answer.

Task 7 - Access Control Models and Policies
Assume a network that consists of a set of nodes, {a, b, c, d, e, f, g, h, j, k, l, x, z}. These nodes have the following partial order relation on them: {(b≤a), ( f≤e), (z≤l), (z≤x), (l≤g), (c≤b), (g≤k), (e≤d), ( g≤h ), (k≤j), (g≤e), (e≤c) , (d≤b) , (x≤e)}

Furthermore, assume that a BLP policy is being enforced in the above network. Now assume that at some stage, node z becomes infected with a virus. Which one of the following sets of actions would also lead to infecting node a, assuming that viruses propagate through a network using the read and write commands. A virus would propagate from one node to another either because the second node read from the first one, or because the first node wrote to the second one. All read and write commands are subject to the policy being enforced and no read or write operation is possible in the absence of an order (either direct or indirect) between two nodes:
a) (l read from z), (l write to g), (g read from l ), (g read from e ) , (e write to c), (c write to b), (a read from b)
b) (z read from l), (a read from l)
c) (z write to x ) , (x write to e), (a read from e)
d) (z write to c), (b write to c), (a read from b)
e) (z write to g), (g write to h), (b read from h), (b write to a)
f) (x read from z), ( x write to e ) , (e write to d), ( a write to d)
g) (z write to g), (j read from g), (j write to d), (d write to b), (a read from b)
h) (z write to l) , (l write to g), (g write to c), (c write to d), (d write to b), (b write to a)
i) (a write to z)
j) (f read from z), (a read from f)
Explain your answer.

Task 8 - Security Datasets and Metrics
Considering the Cyber security open datasets provided by the Los Alamos National laboratory. Choose which one of the datasets below, would be most suitable to the definition of a metric for measuring the probability of the leakage of data from computers. To help you consider which dataset is best suited, you can imagine the scenario where you use the public laptops provided in the lockers in the Future Technology Centre (FTC) floors 1 or 2 during your tutorial hour for this module.
a) dns.txt.gz
b) redteam.txt.gz
c) User-Computer Authentication Associations in Time
d) Unified Host and Network Dataset
e) auth.txt.gz
f) proc.txt.gz
g) flows.txt.gz
Explain your answer

Attachment:- Authentication Protocols.rar

Reference no: EM132849890

Questions Cloud

Provide a commercial transaction risk overview : Provide a commercial transaction risk overview/evaluation of Argentina, China, Egypt, Poland, and South Africa. indicate possible corrective measures
What is the face value of an investment : What is the face value (present value) of an investment at 8% p.a., if at maturity (future value) in 180 days it will be worth $10,394.53
What did you find the most challenging : What did you find the most challenging and how did you overcome that challenge?
How could the company have reduced the costs : Outline the costs that the company now faces as a result of the accident. How could the company have reduced the costs associated with the accident
Cryptographic data objects and authentication protocols : Cryptographic Data Objects and Authentication Protocols - how would this impact the forward secrecy property of K2 for all the three runs of the protocol P1, P2
Choose a popular diet and describe the dietary restrictions : Do you believe a person can be successful in weight loss restricting a macronutrient? Why or why not? Choose a popular diet and describe the dietary restriction
Discuss digital forensics : Discuss digital forensics and how it could be used in a risk management program. What are some mobile forensic tools?
Record transfer of net loss to retained earnings : Infer from the reports the events and transactions that affected Renn-Dever Corporation's retained earnings during 2019, 2020, and 2021
Explain differences between orthodox and reform judaism : Of the many differences between Orthodox and Reform Judaism, which two do you think would cause the strongest disagreement between these branches?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd