Network security related question

Assignment Help Operating System
Reference no: EM1379596

Question1. Assume we want to use Kerberos for securing electronic mail. The obvious way of accomplishing this is for Alice, when sending a message to Bob, to obtain a ticket for Bob and include that in the email message, and to encrypt and/or integrity-protect the email message using the key in the ticket. The problem with this is that then the KDC would give Alice a quantity encrypted with Bob's password-derived master key, and then Alice could do off-line password guessing. How might Kerberos be extended to secure email without allowing off-line password guessing?
(Hint: Issue human users an extra, unguessable master key for use with mail, and extend the Kerberos protocol to allow Bob to safely obtain his unguessable master key from the KDC.)

Question2. Suppose we are using secret key technology. What is wrong with the following source authentication scheme?
Alice chooses a per-message secret key K, and puts an encrypted version of K in the header for each recipient, (ie Bob and Ted). Next, Alice uses K to compute a MAC on the message, say a DES-CBC residue, or to compute a message digest of K and append it to the message.

(Hint: this works fine for a single recipient, but there is a security problem if Alice sends a multiple-recipient message. Once they receive the message, Bob and Ted know both K and K encrypted with the key they share with Alice. This allows either to forge a message to the other as if it were from Alice.)

 

Reference no: EM1379596

Questions Cloud

Provide examples of famous assignments that have failed : Discuss the examples of famous assignments that have failed because of relatively simple errors?
Mobile computing technology : Discuss similarities and differences of patient vital signs using mobile computing technology to in-patient visits to the doctor's office or hospital.
Regulating the networking field : Describe whether there are too many standards organizations attempting to regulate networking field. Take into consideration whether consultation is necessary to manage standards.
Determine transmission line speed : Imagine you are creating an application at work that transmits data record to another building within the similar city. The data records are 500 bytes in length,
Network security related question : Assume we want to use Kerberos for securing electronic mail. The obvious way of accomplishing this is for Alice, when sending a message to Bob,
Develop and manage internet usage : Discuss how does management in business or education develop and manage Internet usage as it relates to research, supplemental resources and functional support? Explain your answer with examples.
Question about big oh relationship : Provide witnesses n0 and c that can be used to prove the relationship. Select your witnesses to be minimal, in the sense that n0-1 and c are not witnesses, and if d
Frequency definition of bandwidth : In data communication we often use term "bandwidth" when we refer to capacity of a link. Strictly speaking, however, bandwidth refers to range of frequencies that can be carried on a link.
Question about Ethernet capture effect : The teacher went over the following trouble in class. However, I do not understand how he describes the work. He skips too many steps and jumps around.

Reviews

Write a Review

Operating System Questions & Answers

  Vliw processor

VLIW processor - assembler

  Database statistics

In an RDBMS, how are the three phases parsing, execution, and fetching carried out? In general, in which phase would you tune a database? Determine database statistics and why are they important.

  Designing crow foot e-r diagram

Make an IE Crow's Foot E-R diagram for the entities section and employee and the 1:N relationship between them. Suppose that a section/department does not require to have an employee.

  P2p file distribution protocol

In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers redistribute the blocks to each other.

  Differences in windows, mac os, unix, and linux os

Discuss the fundamental differences in Windows, Mac OS, UNIX, and Linux operating systems for personal computers? Determine the unique characteristics do mainframe operating systems have?

  Explain basic network security concepts

Explain an example of the Public Key Infrastructure that would describe the differing usages of symmetric and asymmetric encryption and how these encryption technique might use either a substitution or a transposition cipher.

  Benefits and drawbacks of networked computers

Discuss the benefits of networked computers? What are the drawbacks? Describe similar characteristics between the internet and a group of networked computers.

  Validating the option code field during data entry

The systems reviewer are constructing the test plans for the user interface for the Holloway Travel Vehicles system.

  One page document describing security

Analyze the Internet and construct a one page document describing how security is maintained while transacting business over the Internet.

  Value in managing security and risk

Explain ISO 27001's value in managing security and risk. What are the drawbacks and benefits for obtaining ISO 27001 certification?

  Multilevel feedback queues and fcfs

What (if any) relation holds between the following pairs of sets of algorithms (a) Priority and SJF (b) Multilevel feedback queues and FCFS

  Explain decision variables in relation to linear programming

Explain the following terms in relation to linear programming problems- (1) decision variables (2) objective function

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd