How asymmetric cryptography is used to provide encryption

Assignment Help Computer Network Security
Reference no: EM13496594

1.       Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

2.      What is the purpose of the Diffie-Hellman algorithm? What are its major strength(s) and weakness(es)?

3.       Using RSA, let p = 17, q = 13 and e = 5.  What is the complete private key?

4.  Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit key.  The company decides to conduct a "challenge" to crack an encrypted message using a brute-force approach.  The average time to crack the message is found to be 2 hrs.  As a result, Encrypt-It-Rite decides to increase the key length by 8 bits, from 56 to 64 bits.  They then conduct another challenge.  What average cracking time would be expected for the new, improved cipher? If Encrypt-It-Rite would like to increase the average cracking time to at least 100 years, what will be the minimal length of the key?

5.  A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.  A crypto device encrypts each message into 20 bits of ciphertext.

a.       What is the entropy of the plaintext message?

b.      What is the entropy of the ciphertext message?

c.       Is this a good cryptosystem? Why or why not?

 

6.      Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?

 

7.      Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

a.   Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob.  You should also include any steps taken by Bob that allow him to read the message.

b.   Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that Bob could be confident was sent by Alice.  You should also include any steps taken by Bob to determine whether or not Alice actually sent the message.

c.   Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob, and that Bob could be confident was sent by Alice.  You should include any steps taken by Bob to read the message, or to determine whether Alice actually sent the message.

 

8. Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob's public key.  Bob downloads a key from the key server which Eve claims is Alice's public key.

a. Given that Alice and Bob both assume that they have the correct public keys for the other party, and assuming that Eve can intercept any messages passed between Alice and Bob, is there any way that Eve can read the encrypted communications between the two parties?  If so, how could she do it, and would Bob or Alice know that Eve was reading their messages?

b. What steps could Alice take to ensure that the public key which Eve claims belongs to Bob is actually correct?

Reference no: EM13496594

Questions Cloud

Correct statistical decision for this sample : A sample has a mean of M = 39.5 and a standard deviation of s = 4.3, and produces a t statistic of t = 2.14. For a two-tailed hypothesis test with ? = .05, what is the correct statistical decision for this sample?
Two samples from the same population : Two samples from the same population both have M = 84 and s2 = 20, however one sample has n = 10 and the other has n = 20 scores. Both samples are used to evaluate a hypothesis that ? = 80 and to compute Cohen’s d. How will the outcomes for the tw..
What was the statistical decision : The results of a hypothesis test are reported as follows: t(8) = 2.25, p > .05. Based on this report, what was the statistical decision and how big was the sample?
Identical twins share the same physical make-up : Identical twins share the same physical make-up. What does epigenetic research suggest? Which of the following statements about babbling is false?
How asymmetric cryptography is used to provide encryption : Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.
Statements about gender differences : Which of the following statements about gender differences is correct? What happens in the brain to create a long-term memory? What does the scientific evidence suggest about gender differences?
Girls brains and newborn babys brain : An unfortunate outcome of patient "H.M.'s" surgery was. What is true about a newborn baby's brain? Girls' brains
In interacting with children-evidence indicates : In interacting with children, fathers tend to. Recent evidence indicates that
Eating disorders-epigenetic research : Which of the following statements about aging is true? What happens in a typical teen's brain? Eating disorders. Identical twins share the same physical make-up. What does epigenetic research suggest? Epigenetic research suggests that

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cybersecurity research paper

Identifying and explaining how the breach occurred and identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

  How to generate the same hash value

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  Apply division method to calculate hash value of character

How can we apply division method to calculate hash value of character string without using more than constant number of words of storage outside string itself?

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Explain how significant is wireless networking to your

question 1 how important is wireless networking to your company? would your company improve the salesservice process

  Explain decryption speed

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

  A digital evidence and computer crime and technology and law

Digital Evidence, Computer Crime, Technology and Law- As digital criminals have become more sophisticated, security-related incidents have become substantially more diverse in nature, and their impact on society is increasingly more destructive.

  Security infrastructure and protocols

Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.

  Depending on the size of the organization you are asked to

depending on the size of the organization small medium large you are asked to assist in developing a security

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd