How eap facilitates multiple authentication mechanisms

Assignment Help Other Subject
Reference no: EM133911706

Cryptography Algorithms and Implementation

Assessment 1:

Introduction
You will submit work in tutorial activities during the study period. This is an individual assessment.
Part A Classical Encryption

Task:
You are given the following encrypted message:
gsrh rh z hvxvgrlm
Visit the website: Boxentriq Cipher Identifier
Paste the encrypted message into the tool and identify the cipher used.
Use the linked decryption tool provided by Boxentriq to automatically decrypt the message.
Explain the difference between:
Stream Ciphers vs. Block Ciphers
10

Substitution Ciphers
Classify the identified cipher (e.g., Atbash) and explain whether it is a stream, block, or substitution cipher.
Discuss the strengths and weaknesses of the cipher in terms of cryptographic security.
Include screenshots of:
Cipher identification result
Decryption tool interface
Final decrypted message

Task:
You are required to encode and decode your student number using the Vigenère Cipher.
Visit the website: Vigenère Cipher Tool - Boxentriq
Use a keyword of your choice (e.g., your first name or "SECURE") to:
Encrypt your student number (e.g., 12345678) by converting it into a text format (e.g., onetwothreefourfivesixseveneight)
Decrypt the resulting ciphertext using the same keyword
Take screenshots of:
The encryption process
The ciphertext
The decryption result
Explain:
How the Vigenère Cipher works
Why it is considered a polyalphabetic substitution cipher
Its strengths and weaknesses in modern cryptography

Using the Python3 code example in Geeks for Geeks test your answers (show screenshots).

One way to solve the key distribution problem is to use a line from a book that both the sender and the receiver possess. Typically, at least in spy novels, the first sentence of a book serves as the key. The particular scheme discussed in this problem is from one of the best suspense novels involving secret codes, Talking to Strange Men, by Ruth Rendell. Work this problem without consulting that book!

Consider the following message:

koeywduz dk omewzbuof ucftz gcw ojozwcmo

This ciphertext was produced using the first sentence of a different book:
The fog rolled in from the sea and the lanterns flickered in the cold breeze.
Tip:
A → T
B → h
C → e
D → f
E → o
F → g
G → r
H → l I → d
J → i
K → n
L → s
M →a
N →m
O → c
P → b
Q → v
R →w
S → k
T → u
U → y V → j W →x
X → q
Y → z
Z → p
Decode the message: koeywduz dk omewzbuof ucftz gcw ojozwcmo

Hint: The original plaintext is a meaningful sentence related to cybersecurity. Show your workings.
Part B Encryption Calculations
Show all steps in solving RSA when p = 7 and q = 19, e = 5. M (message) = 5.

Research and explain how prime numbers are calculated and the algorithms used to calculate RSA. Explain the steps in the Man-in-the-Middle Attack.
AES
Given the plaintext {101112131415161718191A1B1C1D1E1F} and the key {02020202020202020202020202020202}:
Show the original contents of State, displayed as a 4 × 4 matrix.
Show the value of State after initial AddRoundKey
Show the value of State after SubBytes - use Table provided below.
Show the value of State after ShiftRows
Show the value of State after MixColumns

Part C Encryption Implementation and Applications
The Hill Cipher takes a letter and converts it to a number form. E.g. A = 0, B = 1, C = 2, ...
e.g. Message: ‘DOG' = [3 14 6]
Covert the key into a 3x3 Matrix, Key: ‘GYBNQKURP'.
Multiple the Matrix together (use can use Octave Online). "mod 26" the resultant to get the cipher text.
Reverse the Ciphertext to recover the Message.
The Extensible Authentication Protocol (EAP) is widely used in secure network access.
Explain how EAP facilitates multiple authentication mechanisms (e.g., certificates, smart cards, biometrics) using encryption-based terminology. Get Assignment Help from trusted tutors.
Your answer should include references to key exchange, identity protection, and session key derivation.

You are hired to design a secure access control framework for a multinational company with varying levels of data sensitivity.
For each of the following models, recommend whether encryption should be used, and if so, specify the type (e.g., symmetric, asymmetric, hybrid) and key management strategy:
DAC (Delegated Access Control)
MAC (Mandatory Access Control)
ABAC (Attribute-Based Access Control)
Rule-Based Access
Risk-Adaptive Access
Identity-Based Access
Organization-Based Access
Support your recommendations with examples of how encryption enhances or complicates enforcement in each model.
You are conducting a forensic investigation on a compromised network.
Draw and explain the Authentication Header (AH) used in IPsec for both Transport and Tunnel modes.
Design a hash-based system to track and verify file integrity across multiple endpoints.
Explain how Merkle Trees and Blockchain structures use hashing to ensure tamper-proof logging and traceability.
Define a digital footprint for a computing device and explain how it can be calculated and used in forensic audits.

Reference no: EM133911706

Questions Cloud

Type of physical restraint : A range of factors affect an older person's risk for developing delirium in hospital. Bedrails are a type of physical restraint.
Alternative therapy and complementary therapy : How is holistic health care different than your concept of health care.? what is the difference between alternative therapy and complementary therapy?
Minimal obligations incumbent on all nurses : Do you believe there are minimal obligations incumbent on all nurses to report for duty in a pandemic, and what, if anything, might mitigate these obligations
Describe family structure and function and the relationship : Name the different family developmental stages and give examples of each one. Describe family structure and function and the relationship with health care.
How eap facilitates multiple authentication mechanisms : ITNE3013R Cryptography Algorithms and Implementation, Victorian Institute of Technology - Explain how EAP facilitates multiple authentication mechanisms
Joint statement on delegation : Research the Joint Statement on Delegation from the American Nurses Association and the National Council of State Boards of Nursing.
Explain the candidate vetting and interview process : CJS 205- Describe a situation in which the Service style of policing would be used in the career field. Explain the candidate vetting and interview process.
Communication issues relating to diversity : List three communication issues relating to diversity that may cause conflict between workers and people with support needs.
What are the implementation and planning : What are the outcome evaluation for small pox. What are the implementation and planning.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd