How many ciphertext blocks will be produced

Assignment Help Computer Network Security
Reference no: EM131477903

Information and Network Security Assignment

Q1. We consider the security services:

  • confidentiality,
  • integrity,
  • authenticity, and
  • non-repudiation

for a variety of simple protocols using symmetric or asymmetric cryptosystems, in a network environment where the two participants, Alice and Bob, are communicating in the presence of an adversary (attacker with malicious intent) Eve.

In the following scenarios for each of the four security services, describe whether or not it is achieved, and in either case give reasons.

(a) A → B : m||h(m)

(b) A → B : m||MAC(KAB, m)

(c) A → B : E(PUB, m)

(d) A → B : m||E(PRA, h(m))

(e) A → B : E(KAB, m||h(m))

Notation: m is the message, h() a cryptographically strong hash function, E() an encryption algorithm corresponding to the specified keys (symmetric for secret key, asymmetric for public/private key), MAC() is a message authentication code algorithm, KXY is a secret key shared between entities X and Y (symmetric algorithm), PUX is the public key and PRX the private key of entity X (asymmetric algorithm), || is concatenation function, X → Y specifies X sends to Y.

Q2. Alice and Bob agree to communicate privately via a protocol based on RC4, but they want to avoid using a new secret key for each transmission. Alice and Bob privately agree on a 128-bit key k. To encrypt a message m consisting of a string of bits, the following procedure is used:

(a) Choose a 16-bit seed (random value): r

(b) Generate the ciphertext c = RC4[h(r)||k] ⊕ m for the message, where h(r) is a cryptographically strong hash function that produces 128-bit message digest of the input

(c) Send the bit string h(r)||c

Answer the following:

(a) Suppose Alice uses this procedure to send a message to Bob. Describe how Bob can recover the message m?

(b) After how many messages should Alice and Bob change the secret key k to avoid RC4 key being repeated?

(c) Does increasing the bit size of the seed r make any difference in the previous part of the question? Explain why or why not.

Q3. Alice is using CFB mode of operation to encrypt a 16KB file to send it to Bob (1KB=1024 bytes).

642_Figure.png

(a) How many ciphertext blocks will be produced if Alice uses 8-bit CFB-DES (DES or Data Encryption Standard algorithm as the block cipher in Figure 1)?

(b) How many ciphertext blocks will be produced if Alice uses 16-bit CFB-AES (AES or Advanced Encryption Standard algorithm as the block cipher in Figure 1)?

(c) If there is an error in transmitted ciphertext block C1, how many plaintext blocks will be corrupted when Bob decrypts the file for 8-bit CFB-DES?

(d) If there is an error in transmitted ciphertext block C1, how many corrupted plaintext blocks when 16-bit CFB-AES is used?

Q4. Joe is an overworked and under-appreciated programmer at "This Secure World" company. He is asked to write an RSA key generation algorithm that performs better than the competition. To increase the efficiency of his algorithm he decides instead of generating two random prime factors for the modulus part of every RSA key pair, to reuse one of the previous factors and only generate one new random prime number for the new pair. For instance if the algorithm is generating x RSA key pairs the value of n for these keys would be as:

n1 = p1 x q1

n2 = p2 x q1

n3 = p2 x q2

n4 = p3 x q2

. . .

etc.

This has increased the efficiency of his algorithm by reducing the time required to test the primality of the randomly generated numbers and for the first time in quite a while he is praised by his supervisor for the surprisingly good performing algorithm. The company is going to embed this algorithm in all of their hardware and software products. You are tasked with evaluation of the security of Joe's approach by either approving or rejecting Joe's idea. For either case you need to provide a compelling argument for or against the explained approach. You can use the following four values of n to argue your case (if needed).

n1 = 6707746877476258769687006155346667312135818167434246494098858837590302781071

n2 = 10154884310969769321427673109695437709100362015315810046444550032439143118393

n3 = 16589923032327209104008156227749326050568372812838589709379351079078499097041

n4=1575487835625540131816354221478432115692476442918739107617773841300854393383

Q5. Eve (the adversary to Alice and Bob) intercepts the following communication between Alice and Bob:

  • Alice: Let's use Diffie-Hellman key exchange algorithm to share a secret key
  • Bob: Ok, let the prime be p = 21764036621498105787560256376487687131351962980131606042071496200654587822341 and the primitive root (generator) g = 5
  • Alice: Using your selected parameters my public key is YA = 7268937201146768929726789293736151850236699943837892054706367857897711254113
  • Bob: My public key is YB = 276234186282125810839720184172914090708234028484467282900291170147002076321
  • The rest of the communication is encrypted with KAB

(a) In the above scenario can Eve recover the shared secret key KAB using the captured messages? Explain what stops Eve from recovering the key or how she can calculate the value of the shared secret.

(b) Knowing the private key of Alice as XA = 278623657769 what is the value of KAB?

Reference no: EM131477903

Questions Cloud

Amount of ammonia-based fertilizer : The number of people this planet can support is largely determined by the amount of ammonia-based fertilizer that can be produced.
Discuss what the timbre of the synth adds to the sound : Use the internet to find another song that uses a Moog synth (you may also pick a track that uses a different kind of synth.
Acquisition of a subsidiary and consolidation entries : Preparation of a selection of consolidation elimination journals for year ending 30 June 2019, for an economic entity comprising a parent and subsidiaries plus working papers of a professional standard.
Determine the stopping distance : A 2200 kg car is moving at a speedof 30.0 m/s. Determine the stopping distance (in meters) if the brakes supply a force of 3500 newtons.
How many ciphertext blocks will be produced : FIT3031 Information and Network Security Assignment. How many ciphertext blocks will be produced if Alice uses 8-bit CFB-DES
Distance between wave crests : A water wave oscillates up and down once every 1.50 seconds. The distance between wave crests is 3.80 m. The speed of this wave __ m/s.
Calculate the amount of heat required : Calculate the amount of heat required (in calories) to raise the temperature of 4.8 kg of this material by 16 degrees.
Stationary hot air balloon : A rock mass of 6.00 kg is dropped from a stationary hot air balloon. Its potential energy at the top is 18,000 J.
Analyze and explain what is being done in the five areas : Analyze and explain what is being done in the five areas described above (team, job satisfaction, and stress management) in the company.

Reviews

len1477903

4/28/2017 8:29:40 AM

You can use the WolframAlpha web site to perform any calculation necessary for this assignment. A "Pro computation time" is not required to answer the questions and if you receive such message from the website it is likely that you are not performing the calculations right or the right calculations. In questions related to modular arithmetic do not write the answers in scientific notation, you need to provide all of the digits for any requested parameter (similar to provided values). Try small examples (from lecture notes or other resources) to make sure you are using the proper format for the web site and the correct equation before trying the given values. Only submitted PDF files are accepted. On various text editor software you can use "Save as PDF" option or use free converters to convert your file to PDF. Note: Do not submit a compressed version of the PDF file or a compression of multiple files. Such submissions may risk losing partial or complete assignment marks.

Write a Review

Computer Network Security Questions & Answers

  When applying cryptography determine why securing the key

when applying cryptography determine why securing the key is more important than securing plaintext or ciphertext.

  Create a three page policy for business continuity

Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for actio..

  What are some of the considerations and issues

Discuss key management techniques. What are some of the considerations and issues? Give at least two examples of key management techniques.

  Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739.

  How are authentication used to secure information systems

Explain the difference between two-factor authentication and multifactor authentication. How are they used to secure information systems?

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

  Examine three cable maintenance tools

Examine three (3) cable maintenance tools that you would consider essential for a network team. Of the three (3) tools that you have examined, determine the one (1) that you believe is the most versatile. Provide one (1) scenario that demonstrates..

  What kind of environment is being faced by cybersecurity

Why will the policy decisions faced by a telecommunication executive be very different from the policy decisions faced by a military strategist? What kind of environment is being faced by cybersecurity decision makers

  Identify at least two criminology theories

Motive is one of the main themes that law enforcement must identify in order to prevent future crimes. Law enforcement utilizes the science of criminology to understand criminality and identify potential criminals.  1. Identify at least two criminol..

  What is the principle of adequate protection

What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?

  Provide a windows security implementation model

You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization.

  Develop organizational information systems security policy

Develop an organizational information systems security policy. Include the Overview, Purpose, Scope, Policy, and Compliance sections of the policy. Present the policy in a manner that complies with standardized system policies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd