Cryptography problem

Assignment Help Computer Network Security
Reference no: EM13805167

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret (Alice authenticates to either Bob or Carol by proving knowledge of KA, Bob with KB, and Carol with KC).

Assume a cryptographic algorithm that is linear in the length of the key to perform "good guy operations," e.g., encryption, decryption, key generation, integrity check generation, and integrity check verification; and that it is exponential in the length of the key to perform "bad guy operations," e.g., brute force breaking.

In a well-crafted document, fully discuss the following items. Provide details and justifications for each item. This should be a 4- to 6-page Microsoft Word document. Cite your sources, wherever required.

  1. Advances in computation make computers an order of magnitude faster. Does this work to the advantage of the good guys, the bad guys, or neither? Justify your answer with reasoning.
  2. Assuming a very large message and public keys user, describe what information would need to be included in each of the following:
  • Bob sending an unencrypted, signed message to Alice.
  • Bob sending an unencrypted, signed message to multiple recipients (Alice and Carol).
  • Bob sending an encrypted, signed message to Alice.
  • Bob sending an encrypted, signed message to Alice and Carol.
  • Explain efficiency issues and alternate methods that would work but be less efficient.

Analyze whether it will be easier to have nonrepudiation with the use of public or private user keys. How about plausible deniability?

Reference no: EM13805167

Questions Cloud

Material requirement planning chart : Create an Master Production Schedule and a Material Requirement Planning Chart
How the information would be used to optimize network : The statistics are in the form of counters that start from zero when a valid entry is created. Explained how the information would be used to optimize network. Provided examples of how to change network, based on information gathered and analyzed fro..
Testing the reliability of test issues : How would you test the reliability of your test? How would you assess the validity?
Is international relations a science or an art : To what extent can we speak of a coherent theory of Liberalism in International Relations. DoesKeohane and Nye's notion of complex interdependenceprovide us with a sound explanation of contermporary International Relations
Cryptography problem : Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret
Write a report on mobile application in hospitality industry : Write a report on Mobile applications in the hospitality industry.
Supply equation and the market supply equation. : Derive the firm's long-run supply equation and the market supply equation.
Calculate theoretical cycle efficiency : Calculate the indicted power, the brake power, the brake thermal efficiency and Calculate theoretical cycle efficiency.
Complementary and alternative medicine : Complementary and Alternative Medicine

Reviews

Write a Review

Computer Network Security Questions & Answers

  Assignment on cybersquatting

Discuss your reaction to this issue and the implications this issue causes. Can you see the pros and cons of this from the business point of view versus the personal point of view? Discuss your thoughts.

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Role of planning when developing a cybersecurity strategy

Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation and transition.

  Drafting a security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include. Research and discuss 3 items that you believe are the most important when drafting a security policy plan..

  Identify two competing security products

Identify two competing security products such as antivirus software, firewall, anti-spyware, or any hardware

  Explain about hashing and message authentication codes

Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

  Analyze the emerging security threats

Analyze the emerging security threats presented within the "Security Threat Report 2014" report.

  It project management

Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another corporation.

  Describe a process that would allow alice to send a message

Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

  Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for their network. Print your results.

  What will be your plan to enhance your network security

Assume that you are the network security officer of one company, what will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will..

  Effectiveness of the physical and environmental security

Evaluate the effectiveness of the physical and environmental security measures that the organization you researched used in regard to protecting its assets

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd