Formulate plans for how to approach the immediate issue

Assignment Help Computer Network Security
Reference no: EM13313401

Scenario:  Stella changes banks following her troubles with SHB. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system. She creates a key pair and supplies Fiona, an officer of UST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a floppy disk which she keeps locked in a wall safe at her home. In turn, Fiona gives Stella access to a key server maintained by UST so that she can readily obtain Fiona's current public key {eF, nF} whenever she needs to communicate securely with Fiona.

Things are fine for several months until Stella sends Fiona a message m asking about current interest rates on Certificates of Deposit issued by UST. As shown below, she enciphers the message first, and then signs it:

1476_mod 1.png

A few days later, Stella received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Fiona transferred the money out of Stella's account into an account of her own in a bank on the Caribbean island of Nevis. When reached via long distance in Nevis, Fiona produced a message g from Stella saying: "Thanks for your excellent service, Fiona. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Stella."

Stella files suit against Fiona, UST and the government of the Nevis, claiming that the message was a forgery sent by Fiona herself, asking for triple damages for pain and suffering. Fiona has responded by claiming that all procedures were followed properly and that Stella is filing a nuisance suit.

You have been employed by UST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Stella issue. You obtain Fiona's private key from the UST server, and the cipher text c, and calculate 

1286_mod 2.png

Your report to the UST Board of Directors should address the following issues:

  • From the facts as presented what can be determined about Stella's intentions to make Fiona a gift of $1,000,000?
  • What is the significance of Nevis Island?
  • What is the significance of Stella's message to Fiona asking for interest rates?
  • Assuming UST wishes to continue using RSA as its cryptographic system, what UST and Stella could have done to protect against this controversy arising?

Your report should clearly address these issues including recommendation for the Stella's suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

Reference no: EM13313401

Questions Cloud

What is the velocity of the mass : A spring with a constant of 32N/m is placed on a horizontal smooth surface and a mass of 2.3 kg is pushed against it. What is the velocity of the mass as it leaves contact witht he spring
A manager at winsome manufacturing company : A manager at Winsome Manufacturing Company
Find the fraction of the electrons removed from thus iron : A block of iron 3.00 kg is charged positively with the net charge of .010C. find the fraction of the electrons removed from thus iron
Immune from escalating transportation costs-tipping fees : A waste management strategy that is immune from escalating transportation costs and tipping fees is:
Formulate plans for how to approach the immediate issue : formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.
Right versus right moral dilemma or right versus wrong : Is this an example of right versus right moral dilemma or right versus wrong? Explain your answer either by identifying the two stakeholders and the rights in conflict or by explaining what makes this a right versus wrong situation and the rule..
Calculate the possible velocities of the mother particle : a particle's rest mass is 1.25 M0c^2, decays into two identical paricles of mass .45M0 each. calculate the possible velocities of the mother particle
Designs and fabricates vlsi chips : Assume that you work for a company that designs and fabricates VLSI chips. You have been given the job of selecting a new computer-aided design software package for the engineering group. A. Develop a MAUT model to assist in the selection proces B. D..
Examine the federal tort claims acts : Examine the Federal Tort Claims Acts (FTCA). Discuss whether these laws reduce the risk to citizens or does it serve a compelling state interest. Analyze Dolan v. United States Postal Service.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  Prepare a security checklist for new century

You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

  Protection of transmitted information-sensitive data stored

You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  What is the discrepancy rate of closure

If you collected these metrics, would they provide you with answers to the questions? Why or why not? What other information, if any, would you need?

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  Targets of security breaches can be larger-smaller companies

Study three recent information security breaches. Do the key targets appear to be larger or smaller companies? Is there particular industry which appears predominately targeted?

  Difference between the terms safety and security

What is the difference between the terms ‘safety' and ‘security' and what is the conclusion of the paper?

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd