Describe concisely and clearly your protocol a and b

Assignment Help Computer Network Security
Reference no: EM131275181

Assignment

Let's suppose that Alice and Bob have each a number n_A and respectively n_B between 1 and 10 and they want to know if they have the same number or not. The problem is that in case they don't have the same number, they don't want to reveal to the other party any other information. They can solve this problem with thefollowing protocol that uses 10 boxes that have a small opening and two pebbles. Each box also can be locked and opened with a key. We assume that Alice has the keys of all boxes.

1. Alice enters alone in the room where the boxes are and she inserts a pebble in the n_A-th box.

2. Bob enters alone in the room where the boxes are and he inserts a pebble in the n_B-th box. He cannot open any of the boxes because the keys are in the other room.

3. Alice enters and opens the n_A-th box. If it has two pebbles, it means that n_A = n_B, and if it has a single pebble, then n_A is not equal to n_B. Alice tells Bob whether n_A and n_B are equal or not.

Note that we assume that Alice is honest and she follows the protocol's rules (otherwise she could open all boxes and see what n_B is).

(A) Your first task is to design a protocol (name it Protocol A) that has the same functionality as the one above, but instead of locked boxes, uses some encryption scheme, and email for communication.

(B) Your second task is to design protocol B using encryption schemes and email communication, in which Alice and Bob need to determine whether n_A + n_B>= t, where t is some threshold number. As before, Alice and Bob will not learn anything else besides that the sum of their numbers is at least T, or not.

In both protocols, you can assume that Alice and Bob are honest, and follow the rules of the protocols designed by you.

Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.

Reference no: EM131275181

Questions Cloud

Difference between data mining and micromarketing : What is the difference between data mining and micromarketing?- Give an example of micromarketing.-  Describe five ways in which companies may use a database.
How did beethoven support himself throughout his life : How did Beethoven support himself throughout his life? How was his career path different from those of Haydn and Mozart? How did this affect audience attitudes toward his music?
What are the five advantages of secondary data : Name three external databases and identify other external databases available to you at your school.- What are the five advantages of secondary data?
How would you handle this situation in a counseling setting : How would you handle this situation in a counseling setting? Describe at least three (3) "Issues facing beginning counselors", as discussed by Corey, that you anticipate may be a problem for you. Please elaborate.
Describe concisely and clearly your protocol a and b : Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.
Main program will output the sum : The main program should then call a function sum that will calculate the sum of the values and return this sum back to the main program. The main program will output the sum. This program shows that you can successfully pass a two-dimensional arra..
Nature of antigones relationship with polynices : When Creon orders Antigone imprisoned in the cave, what is his ultimate goal - What is the nature of Antigone's relationship with Polynices?
Which disadvantage of secondary data is resolved : Which disadvantage of secondary data is resolved by geodemographics and why?-  How would you go about evaluating secondary data? Why is evaluation important?
Find the number of shrinkage pores in the casting : the number of shrinkage pores in the casting if all of the shrinkage occurs as pores with a diameter of 0.05 in.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  Why are anti-social engineering and dumpster diving safeguar

Attackers are becoming more ingenious in their attack methods every day. A part of this evolving methodology is the physical aspect of security. Please respond to all of the following prompts: 1. Why are anti-social engineering and dumpster diving sa..

  Explain network security management-flow diagram

Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:

  Describe application of network security and management

Evaluate the ethical concerns that communication networks raise in a global context. Describe the application of network security and network management in communication technology environments.

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Identify the types of network components devices and

define the requirements and then design an appropriate network that would support this dental practice. your answer

  Internet security cryptography

Public-key cryptography standards (PKCS) (Wang, 2012) are standards widely used by the Internet security community. For this Discussion, you will choose one of these standards and explain what it does.

  Biometric authentication methods for on-line transactions

What is the weakness for Biometric authentication methods for online transactions

  It project management tasks

Project life cycle consists of different phases. Recognize the main IT project management tasks associated with the concept, development and closeout phases of the project life cycle.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd