How system derive secret key for des from user-s password

Assignment Help Computer Network Security
Reference no: EM1354897

Q1) Because of known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. In this system the standard UNIX password file is replaced with a publicly readable file /etc/publickey. An entry in the file for user A consists of a user's identifier IDA, the user's public key, PUA, and the corresponding private key PRA. This private key is encrypted using DES with a key derived from the user's login password PA. When A logs in, the system decrypts E[PA, PRA] to obtain PRA.

(a) How might the system derive the secret key for DES from the user's login password PA?

(b) When A logs in, the system verifies that PA was correctly supplied. How?

(c) In terms of password security, does this method offer more, less or the same level of security as the standard UNIX password system? Justify your answer.

Reference no: EM1354897

Questions Cloud

Principles of the psychologists code of conduct : Please help me discuss the major concerns of testing relative to the standards of testing presented by the authors. Explain how these concerns pertain to the general principles of the Psychologists Code of Conduct.
Determine the effective spring constant of the molecule : The jet accelerates uniformly, and during that time, the pendulum oscillates about the equilibrium position shown by the solid line, with D = 0.370 m. find the magnitude of the plane's acceleration.
Organizational structures and design : Identify whether the company has been successful or unsuccessful and explain how the company used its structure and design to achieve its business objectives.
Explain how has bmw achieved continuity of brand message : Explain How has BMW achieved continuity of brand message without alienating existing customers and encouraging new Mini purchasers?
How system derive secret key for des from user-s password : Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..
Adjusting entry-interest receivable : Adjusting Entries: Interest receivable at 1/1/06 was $5,000. During 2006 cash received from debtors for interest on outstanding notes receivable amounted to $6,000.
Explain how can tax cuts help revive the economy : Explain how can tax cuts help revive the economy include discretionary fiscal policy, expansionary fiscal policy, tax multiplier, Aggregate Demand-some-not all--of these and/or other terms from this week.
Exxon organizational performance : "The Outlook for Energy: A view to 2030". This company caused the Valdez oil spill in Prince William Sound, Alaska (1989).
Explain if it is significant you should not try to interpre : Explain If it is significant, you should not try to interpret the main effects at all and Explain why this is the case, giving an example to illustrate your explanation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Network threats

confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd