Explaining the DS or a MAC algorithm

Assignment Help Data Structure & Algorithms
Reference no: EM131823455

Question: In this problem we will compare the security services that are provided by digital signatures (DS) and message authentication codes (MAC). We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS. State whether and how (i) DS and (ii) MAC protect against each attack. The value auth(x) is computed with a DS or a MAC algorithm, respectively.

a. (Message integrity) Alice sends a message x = "Transfer $1000 to Mark" in the clear and also sends auth(x) to Bob. Oscar intercepts the message and replaces "Mark" with "Oscar." Will Bob detect this?

b. (Replay) Alice sends a message x = "Transfer $1000 to Oscar" in the clear and also sends auth(x) to Bob. Oscar observes the message and signature and sends them 100 times to Bob. Will Bob detect this? c. (Sender authentication with cheating third party) Oscar claims that he sent some message x with a valid auth(x) to Bob but Alice claims the same. Can Bob clear the question in either case?

d. (Authentication with Bob cheating) Bob claims that he received a message x with a valid signature auth(x) from Alice (e.g., "Transfer $1000 from Alice to Bob") but Alice claims she has never sent it. Can Alice clear this question in either case?

Reference no: EM131823455

Questions Cloud

Formulate a class that stores the data for the game : Also, make sure you understand the code in the main method. Formulate a class that stores the data for the game
Define intrinsic growth factors and extrinsic growth factor : Define the intrinsic growth factors, extrinsic growth factors, acidophile, alkaliphile, stress proteins, sigma factors (proteins) and water activity.
Explain genetic and evolutionary approaches to personality : Explain the genetic and evolutionary approaches to personality. Briefly describe the theories, each theorist's contributions
What risk-mitigation solutions do you recommend : What risk-mitigation solutions do you recommend for the problem of: User inserts CDs and USB hard drives with personal photos etc.
Explaining the DS or a MAC algorithm : In this problem we will compare the security services that are provided by digital signatures (DS) and message authentication codes (MAC).
Creating performance expectations for an expatriate : What cultural differences must be considered when creating performance expectations for an expatriate
What changes in bob decision-making situation : What changes in Bob's decision-making situation might make a DSS appropriate? Respond in paragraph.
Difference between a simple memory card and a smart card : List and briefly describe four common techniques for selecting or assigning passwords. Explain the difference between a simple memory card and a smart card.
Describe three different common living arrangements : Describe three different common living arrangements for mid-adults (ages 36-55). Describe how each of the living arrangements

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd