Explain concisely and clearly your protocol a and b

Assignment Help Computer Network Security
Reference no: EM131299364

PROJECT

Let's suppose that Alice and Bob have each a number n_A and respectively n_B between 1 and 10 and they want to know if they have the same number or not. The problem is that in case they don't have the same number, they don't want to reveal to the other party any other information. They can solve this problem with thefollowing protocol that uses 10 boxes that have a small opening and two pebbles. Each box also can be locked and opened with a key. We assume that Alice has the keys of all boxes.

1. Alice enters alone in the room where the boxes are and she inserts a pebble in the n_A-th box.

2. Bob enters alone in the room where the boxes are and he inserts a pebble in the n_B-th box. He cannot open any of the boxes because the keys are in the other room.

3. Alice enters and opens the n_A-th box. If it has two pebbles, it means that n_A = n_B, and if it has a single pebble, then n_A is not equal to n_B. Alice tells Bob whether n_A and n_B are equal or not.

Note that we assume that Alice is honest and she follows the protocol's rules (otherwise she could open all boxes and see what n_B is).

(A) Your first task is to design a protocol (name it Protocol A) that has the same functionality as the one above, but instead of locked boxes, uses some encryption scheme, and email for communication.

(B) Your second task is to design protocol B using encryption schemes and email communication, in which Alice and Bob need to determine whether n_A + n_B>= t, where t is some threshold number. As before, Alice and Bob will not learn anything else besides that the sum of their numbers is at least T, or not.

In both protocols, you can assume that Alice and Bob are honest, and follow the rules of the protocols designed by you.

Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.

Reference no: EM131299364

Questions Cloud

Represent situation of restaurants with an e r diagram : Each menu has many menu items, and items can appear on multiple menus, and with different prices on different menus. Represent this situation of restaurants with an E-R diagram.
Provide another recommendation : Provide another recommendation.- Just conduct more research on the area of expanding menu. Read the file for detailed instruction.
Describe national trends that will affect the brand : Give a brief description of the company, the selected brand, its functionality and/ value offering.- Describe national trends that will affect the brand.
What problems does a company face when someone hacks data : What problems does a company face when someone hacks into their data? Identify the legal aspects of loss of customer personal information? Compare and contrast the advantages of tables and views.
Explain concisely and clearly your protocol a and b : Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.
Do you object to any of these course policies : Students are certainly somewhat dependent on their teachers. Do you object to any of these course policies? If so, which ones, and why?
Discuss occurrence or breach or disaster that has happened : Discuss the occurrence or breach or disaster that has happened. Perform a risk assessment and threat identification section for the organization that you have chosen, as RISK ANAYSIS AND THE.
Describe national trends that will affect the brand : Describe national trends that will affect the brand.- Describe the brand's competitive advantage in terms of quality, price, selection, location, and service.
Write c program that calculates and prints average of grades : Write a C program that calculates and prints the average of several grades entered by the user. The program should first prompt the user to enter the number of grades to process.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the most common forms of digital crime

Explain the most common forms of digital crime. Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  Paper - software security operations in cloud computing

Comments/Deadline : Topic "Software Security Operations in Cloud Computing"( The topic must relevant to Software Security concepts, operations, trends, or best practices.)

  Maintain an online reflective blog

Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  Discuss symmetric and asymmetric key encryption

A short introduction to SSH, explaining why it is the preferredway of logging into a remotemachine-this explanation will need to discuss symmetric and asymmetric key encryption.

  Describe why important to secure windows-unix from servers

Describe why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  Trust computation in computer systems

Select and summarise an article from the University of Liverpool online library that addresses trust computation in computer systems. Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent enviro..

  What is the mutual information of the source and receiver

A source X sends 0's and 1's with probabilities π and 1-π, respectively, to a receiver Y. - What is the mutual information of the source and receiver?

  What are service level agreements

What are Service Level Agreements (SLAs) and why are they a critical component of any IT Outsourcing agreements?

  Principles and theory of security management

so far this week we have discussed three types of security: retail, institutional, and industrial. I think that there is a little bit of confusion still about what the differences are between each of these types of security because we are looking..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd