Design for a money transfer protocol

Assignment Help Computer Network Security
Reference no: EM131737243

Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission.

1105_figure.jpg

Issuing a Check:

1. Payee (A) will contact the bank requesting the issuance of $ amount check made payable to (B).
2. Bank responds by sending the payee a check receipt CR, where:

CR = RSA( PuA , check )

check = RSA( PuC , token )

token = AES128( KeyBank , amount )

3. Payee (A) receives the check receipt from the bank, extract the check from it and pass it to the receiver (C).

4. The receiver extracts the token from the check and pass it to the bank encrypted with its own private key to collect the money.
From C to Bank: RSA( PrC , token )

Given the following information about A, C, and the Bank:

For A:

Key length: 1024
Public Exponent: 65537 Public modulus [n]:
B5112FD2E82FB505D8C641DFC7087EBEC3971492CE3B5581BFE239AB192B190B443188BA995FB8BE231021A99E B1679EFE6257BC0DAF95552F92D87BB0E0D6BEB79601DFC74020E915A615FF5C5C7662C3ED5E76266EC4A0A030 92CE3B558B3905FD0A6468120091257EF75B0BBFAC5BDBF56FD4496133F640C7078982372117

Public exponent [e]: 010001 Private exponent [d]:
241C2F5B726EC13D4F440AB324306F867FDF4B7D13A005A780AB0F312E2DC82AD508C3E9E2D892316930B865E9
7E1BDA3B854555FDACBCAD667574B3064D70C5F611E7C6AF45BE29BADA7E5F5494DD8DD79C2BFCCFC1F898E20 BCA8F4BE7AB4142A1499E2DB21FE29E9AD29A6CFACED52BFE1DC94CD52EF76F6ACB1BF167DB81

For C:

Key length: 1024
Public Exponent: 65537 Public modulus [n]:
AB39243C0238D017C8179590824AAB0CA69E9815DF41C34E229AAB7C1F285999122CFBA56D67BA707207480696 928B5719296293123F39BE10EDE7CAB748EE52A088BD094773B313B50A17F088CBBBA70B0537761D12E2EE2D80
54B4974C955C9BF2AACD0DAA1081165E6BE52552E2CABFD6A5232A591369CCF812466C01596B

Public exponent [e]: 010001 Private exponent [d]:
45778870E441E2835385E6035C29291E97D70E43097227E7E278380CC2A35F3E903639DE92F59B999559C8EA0B5 AE7376E18F14A5403DCCC7517E08BC932C8A58961376EB1A4ED80EBA15B3877E0BCE1BA0BEDC6FA06C04C6D5E8 75B30898EC045678168EB06BB3344FEAE2F904761B37D3631DA864FA3AC35B25C539E245CA1

For the Bank:

AES128 Key: 670DBA40AB1F3752EF0DC1D0F8FB4958

a. Calculate the messages sent in steps 1 to 4 if A is sending $ amount equals to your NYIT ID to C.

b. Explain two different vulnerabilities and attack scenarios that are applicable to the above design.

c. Propose an enhancement to the above design to make it more secure.

Verified Expert

This assignment describe the mechanism about the encryption and decryption using the RSA and AES mechanism and it also describes about the weakness of the public key cryptography and also contains discussion of the enhanced technology that we can use to make it more secure.

Reference no: EM131737243

Questions Cloud

What factors cause the change in the cpi : Calculate the various measures of inflation for the following data. Assume all price indexes are 100 in Year 1.
What is amount of net cash provided by operating activities : What is the amount of net cash provided by operating activities that would be reported as a result of these transactions
Company first international order : Also, this is the company's first international order. On the other hand, the company in China is willing to pay only $125 per unit.
Discuss selected tv episode included aggression or violence : Discuss at least two (2) possible reasons why the selected TV episode included aggression or violence
Design for a money transfer protocol : INCS-741 Cryptography - Calculate the messages sent in steps 1 to 4 if A is sending $ amount equals to your NYIT ID to C - Explain two different vulnerabilities
Identify sources of long-term financing for genesis energy : Identify the sources of long-term financing for Genesis Energy. What is the required return for Genesis Energy shareholders?
Total cost is used to determine the price : Demand is estimated to be 110,000 units annually. What is the price if a markup of 40% on total cost is used to determine the price?
Describe the measure of actual unemployment : How is full employment defined, and why does the full-employment rate of unemployment keep changing?
What is the approximate market value of the bond : A 5-year zero-coupon bond was issued with a $1,000 par value to yield 8%. What is the approximate market value of the bond?

Reviews

inf1737243

4/14/2018 6:28:38 AM

Followed instructions, and turned the assigned hours before the deadline... thank you so much! will definitely hire again for future papers.

inf1737243

12/19/2017 3:53:01 AM

I want to know what your expert understand by seeing this assignment.My professor said he had a tool,when he do the process from backwards(as a given design in pdf) he has to get cash amount(which is my NYIT ID number)and do the same process by taking cash amount as another number..so I need perfect answers for the given questions in assignment & source codes

len1737243

11/25/2017 2:11:30 AM

Please submit your work in PDF format. Please title your file with your name U have to take cash as 1186949 & do the same process by taking cash as 1173725 The receiver extracts the token from the check and pass it to the bank encrypted with its own private key to collect the money.

Write a Review

Computer Network Security Questions & Answers

  Design and label the bandwidth availability or capacity

Explain each network device's function and your specific configuration. Design and label the bandwidth availability or capacity for each wired connection.

  Identifies areas of concern based on your review of network

Create a 2-page Excel spreadsheet that identifies areas of concern based on your review of the network along with a proposed solution.

  Analyze the impact of security breaches

Each team has to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once a team selects a particular security breach to work on, other teams cannot ..

  Personal and business-related cybersecurity scenarios

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios - Describe the mission of each, and examine and compare details of each stated privacy policy.

  When deciding on the proper architecture to run an

the data that organizations gather about their users can vary between strictly commercial information what books did

  Define the concepts of symmetric key encryption

Define the concepts of symmetric key encryption, public key encryption, and hashing and explain which of these techniques are used for confidentiality and authentication.

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Security issues

A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation.

  Identify steps required for implementing a security program

Identify three steps required for implementing a physical and environmental security program. Explain how you would factor risk management practices into the development of the policies you constructed above.

  Case study-the ethical hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and ..

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd