Infa 640 cryptology and data protection

Assignment Help Computer Network Security
Reference no: EM13496616

1.      A 1,048,576-bit message is used to generate a 20-bit hash. One the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 20-bit hash?

2.      Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,… , pn} and corresponding ciphertext = {c1, c2,… , cn}. Suppose the encryption function is ci = pi + 10 (mod 26).  If you receive the ciphertext message MYXCDSDEDSYX and are asked to recover the plaintext. answer the following questions: a). What is the decryption function, b). What is the decrypted plaintext? c). What are some weaknesses of this cipher?

3.      You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739. You have secretly picked the value SA = 5.You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 113.  What is the value of your shared secret key?

4.      Bob believes that he has come up with a nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter’s position in the alphabet, i.e., VA = 1, VB = 2, …, VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 …x VChar N) mod(26). Bob uses this function to send a one-word message, SMALL, to his banker Bill, along with his calculated hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob’s original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob’s original hash.

5.       . Consider the following plaintext message: INFA 640 IS A UMUC GRADUATE COURSE.

a.       (2 pts) If this message is sent unencrypted and successfully received, what is its entropy?

b.      (2 pts) If this message is encrypted with DES using a random 56-bit key, what is the encrypted message’s entropy?

6.      A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function.  In the process of encrypting a message, a character in the plaintext is XORed with the pseudorandom byte 10110101.

a.       (2 pts) What is the ciphertext (in binary form) generated by the encryption of the character X?  (Please show your work.)

b.       (2 pts) What is the plaintext for the ciphertext 11110110? (Please show your work.)

7.      The following ciphertext is a monoalphabetic ciper:

 

LODGOOX BOZODSDSYX KXN PYBQODDSXQ SD SC K WKBFOV DRKD K XOG DRYEQRD OFOB CDBEQQVOC SXDY OHSCDOXMO WKCYX MYYVOI

 

Decrypt this message, and briefly describe your cryptanalysis methodology.  In particular, list features of the ciphertext that hindered or helped your decryption process.

Features of cipher text that helped:

8.      An organization has 250 members.  It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages. (Explain the details of each question below)

a.       (2 pts) What is the total number of keys that are required for the organization if symmetric cipher is used.

b.      What is the number of keys that are required for each member if symmetric cipher is used.

c.       (2 pts) What is the total number of public key(s) and private key(s) are required for the organization if asymmetric cipher is used.

d.      (2 pts) How many public key(s) and private key(s) are required for each member if the asymmetric cipher is used.

9.      (4 pts) Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user’s data in a file on the hard drive. Alice has decided to use RSA as her encryption algorithm.  As the cryptographic consultant for the project, do you think this is a good choice or not?  You should state the reasons for your answer, and suggest an alternative if you do not think she made a good choice.

10.  (4 pts) Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.


11.  (4 pts) What is the purpose of the Diffie-Hellman algorithm? What are its major strength(s) and weakness(es)?

12.  (4 pts) Using RSA, let p = 17, q = 13 and e = 5.  What is the complete private key?


13.   (4 pts) Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit key.  The company decides to conduct a “challenge” to crack an encrypted message using a brute-force approach.  The average time to crack the message is found to be 2 hrs.  As a result, Encrypt-It-Rite decides to increase the key length by 8 bits, from 56 to 64 bits.  They then conduct another challenge.  What average cracking time would be expected for the new, improved cipher? If Encrypt-It-Rite would like to increase the average cracking time to at least 100 years, what will be the minimal length of the key?

14.  A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.  A crypto device encrypts each message into 20 bits of ciphertext.

a.       What is the entropy of the plaintext message?

b.      What is the entropy of the ciphertext message?

c.       Is this a good cryptosystem? Why or why not?

15.  (4 pts) Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob’s file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?

16.  Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

a.       (4 pts) Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob.  You should also include any steps taken by Bob that allow him to read the message.


b.      (4 pts) Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that Bob could be confident was sent by Alice.  You should also include any steps taken by Bob to determine whether or not Alice actually sent the message.

17    The message which is received by the bob is passed through the Message digest which produces the digest which should be same as the digest calculated by the Bob for message using the secret information. If the messages digest is same in both the cases then verified sent by Alice else fail.
(4 pts) Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob, and that Bob could be confident was sent by Alice.  You should include any steps taken by Bob to read the message, or to determine whether Alice actually sent the message.

17    Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.

a.       (4 pts) Given that Alice and Bob both assume that they have the correct public keys for the other party, and assuming that Eve can intercept any messages passed between Alice and Bob, is there any way that Eve can read the encrypted communications between the two parties?  If so, how could she do it, and would Bob or Alice know that Eve was reading their messages?

b.      (4 pts) What steps could Alice take to ensure that the public key which Eve claims belongs to Bob is actually correct?

Reference no: EM13496616

Questions Cloud

Highlights the important aspects of memory : Formulate a plan that can help you put into operation to help improve your memory and avoid the pitfalls that cause forgetting. To effectively answer this question, please create a personalized outline that highlights the important aspects of memory.
Feelings are heavily influenced by role and status : “Behavior and feelings are heavily influenced by role and status.” Name a social psychology study that provided powerful evidence that this may be true: _________________________.
Study of cognitive development : Which approach to the study of cognitive development makes the most sense to you? Why? What is it about you that contributes to your choice
Universal innate emotions : Name a psychological scientist who proposes that there are “universal” innate emotions that are recognizable by facial expressions across all human cultures. ______________________ Name one of those emotions. ____________.
Infa 640 cryptology and data protection : Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.
Famous pygmalion in the classroom experiment : In the famous Pygmalion in the Classroom (Rosenthal) experiment, the students who were arbitrarily labeled to be high performing late bloomers excelled because_____________________________________.
Delusions and gross disorganization of personality : This is a psychotic disorder that features hallucinations, delusions, and gross disorganization of personality. It is manageable with anti-psychotic drugs, therapy and other psychosocial interventions ___________________.
Behavior and feelings are heavily influenced : “Behavior and feelings are heavily influenced by role and status.” Name a social psychology study that provided powerful evidence that this may be true: _________________________.
Example of a former mental illness : An example of a “former” mental illness (a human behavior or state that was once considered a disorder and is now no longer held to be such in the DSM-IV) is _______________.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security measures currently in place give adequate security

Explain in scholarly detail on whether you believe security measures currently in place give adequate security as well as privacy, or do you believe these issues being emphasized are at the expense of the other?

  Explain the purpose of the law

Also, don't forget to keep up with references to include on the powerpoint. note: I'm a member in group of the persons .My part is 6 slides.So. the slides must just have info about the topic . could you please help me with that ?

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Write application-layer protocols use to move message

Explain how message gets from Alice's host to Bob's host. Make sure to list series of application-layer protocols which are used to move message between the two hosts.

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Which will encrypt each users data in a file

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.

  Uniform law for computer information transactions

After more than ten years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws at long last voted to adopt the Uniform Computer Information Transactions Act on July 29.

  If you choose to use cookies explain the extent to which

research and answer the following questions is a streamlined user experience worth possible invasions of privacy? how

  Explain network security management-flow diagram

Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:

  How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

  The hr department has sensitive information

The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd