Describe a meet in the middle attack

Assignment Help Computer Network Security
Reference no: EM131110087

1. Answer the following questions briefly
a. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.

b. What is social engineering? Briefly discuss 3 different social engineering exploits to steal someone's password?

c. If you are given a hash function (say SHA-1), design one-time password scheme for access control to your server. (Hint: You should specify details on how you will generate the passwords maintain them)

d. Describe a covert channel? Give an example and comment on the speed of the covert channel in your example.

e. As we discussed in class, early implementations of RSA, used a common e= 3. What was the security limitation of this choice? Instead, if one were to fix a common d =3 what is the security implication?

2. Consider the Elliptic curve
E: y2 = x3 + 11x + 19 (mod 167)
Suppose E and point P (2, 7) are used for ECC Diffie-Hellman key exchange.
Alice chooses the secret value A = 12 and Bob chooses the secret value B = 31.
a. What value will Alice send to Bob?
b. What does Bob send to Alice?
c. What is the shared secret at the end of the exchange?


3. For this problem you need to run MD5. You may either download a certified version of MD5 or use web-based MD5 services. You should specify what you used; for example, give the URL.
You are given a sentence "Your_Last_Name" loved 7339
a. Generate a hash for the above sentence by selecting the last 4 bits from the MD5 hash
b. Perform a birth-day attack to change the sentence to "Your_Last_Name" hated 7339


4. You are given a password file containing 64 random passwords each of which are 6 characters long where each character can assume 128 different values.
If you were to attack this password file, what is the complexity of attack for the following scenarios:
a. Brute force attack to find Alice's password
b. Brute force attack to find somebody's password
c. Attack to find Alice's password with a dictionary containing 1024 chosen passwords
d. Attack to find any password with the same dictionary

Reference no: EM131110087

Questions Cloud

Why does the mirror image rule still apply : Why does the Mirror Image rule still apply in certain business scenarios? Why has the UCC largely discarded the mirror image rule, while it still persists in various parts of the common law
Calculate the implied price of each warrant for each : Calculate the implied price of each warrant for each of the bonds shown in the followingtable.
Identify the potential sources of conflict among managers : As the new Vice President of Operations for a chain of movie theaters, you have identified a high level of conflict among the managers of individual theaters about which theater has priority to show first-run films, which managers have more influe..
How is a proof by induction similar to conditional linear : How is a proof by induction similar to conditional linear recursion?
Describe a meet in the middle attack : 1. Answer the following questions brieflya. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.
What kind of case is this civil or criminal : Facts: Maria Kerkoulas owned the Pub Zone bar, frequented by many motorcycle gangs, and knew from her own experience and conversations with police that some of the gangs, What kind of case is this, civil or criminal
Describe the organizational structure of xecodynamics : Describe the organizational structure of Xecodynamics. What are the advantages and disadvantages of the current organizational structure? If Xecodynamics remains a standalone company, what indicators will signal to the leadership team that a chang..
Create a simple alice world with a few objects : Create a simple Alice world with a few objects of your choice, including a character that you create with hebuilder or shebuilder, and create both iterative and recursive methods to make the character walk to a target object.
Prepare jennifer brent corporation''s 2011 journal entries : Jennifer Brent Corporation owns equipment that cost $80,000 and has a useful life of 8 years with no salvage value.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

  What is an information security program?

What is an information security program?

  Article on wireless hacking

Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT change so rapidly, your article should be no older than 2007.

  Personal information security through public wi-fi

Write paper on Personal information security through public Wi-Fi

  Write down a 350- to 700-word article review addressing the

write a 350- to 700-word article review addressing the sequential process the article discusses that highlights a

  What types of physical controls can be implemented

What types of physical controls can be implemented to protect the perimeter of a building

  A web session can be protected against the eavesdroping

Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016.

  Analyze three specific potential malicious attacks

Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.

  Essence of a digital signature is ensures authentication

1. The essence of a digital signature is that it ensures authentication. Explain how and why it does that.

  Define cybersecurity as an organizational strategy

Prepare a short paper of approximately 8-12 ( double spaced)pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications.

  Describe and assess impact of these devices on newspaper

Personal data assistants (PDAs), iPads, and e-Readers have the capability to wirelessly connect to online stores so that their users can purchase books, music, games,read e-Books, read the news, and perform a myriad of other tasks

  Discuss primary challenges related to maintaining security

Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd