Question 1 alice and bob are sending a message m to each

Assignment Help Computer Engineering
Reference no: EM13347756

Question 1. Alice and Bob are sending a message m to each other

a) Give one method to achieve confidentiality for m.

b) Give one method to achieve integrity but NOT confidentiality for m

Question 2. Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw a diagram only to describe the message exchange and the content of each message.

Question 3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Show the entire mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Show the entire mathematical steps)

Question 4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Assume the encryption is absolutely unbreakable.

a) Can B be reasonably sure that the message is generated by A? Why?

b) If B shows another person C that B can use the key k to decrypt the message, can C be reasonably sure that the message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C can be reasonably sure that the message is indeed generated by A?

Question 5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following questions:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If the length of the key is doubled, what is the amount of time required to decrypt the message with brutal force? Why?

Question 6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts the cipher text and retransmits c1-c3-c3-c4, what will be the "plain text" blocks being decrypted into?

Reference no: EM13347756

Questions Cloud

Question 1a ceos usually talk about developing a learning : question 1a. ceos usually talk about developing a learning organization? what is meant by a learning organization?b
Implement the delivery company using the classes given in : implement the delivery company using the classes given in the class diagram above. construct a cpp file named
Write a complete c program to do the following1 the main : write a complete c program to do the following1. the main program will read in a parameter value n read this in main.
Problem 1 integrationcreate a program to integrate an : problem 1. integrationcreate a program to integrate an arbitrary time-domain signal with variable limits of integration
Question 1 alice and bob are sending a message m to each : question 1. alice and bob are sending a message m to each othera give one method to achieve confidentiality for m.b
Problems1the file myinputfiletxt is an encrypted file your : problems1.the file myinputfile.txt is an encrypted file. your assignment is to decrypt this file and hopefully answer
As a senior in a professional services firm you have been : as a senior in a professional services firm you have been assigned to plan the financial statement audit of a private
Problem 1 if purchasing power parity applied to big macs : problem 1. if purchasing power parity applied to big macs and a big mac cost 2.50 in the united states while the
Auditing project overviewnbsp casenbsp you will be asked to : auditing project overviewnbsp casenbsp you will be asked to address a accounting failure from american insurance group

Reviews

Write a Review

Computer Engineering Questions & Answers

  What does this following algorithm calculate

What does this following algorithm calculate

  Explain the costs involved in the creation of the system

Describe the types of business needs that can be addressed using information technology-based solutions.

  How to write an applet that draws the house shown

How to write an applet that draws the house shown. When the user clicks on the STOP sign an audio of your choice plays.

  How to develop a simple scientific calculator

make a Clear button to clear the result text box and reset all controls.

  Develop a program to read a list of words as input

Develop a program to read a list of words as input. As these words are read store them into a dynamically allocated binary search tree. After all words are stored do a "pre-order" traversal of the tree.

  Write down a sql statement to show warehouse

Write down a SQL statement to display the SKU and Description of all items stored in the Seattle, Chicago or New Jersey warhouse. Do not use IN.

  Provide examples where cannot use logical operators

Search for arithmetic operators used in programming, and give two examples where you cannot use logical operators but you can use arithmetic operators. Also, think of two examples where both kinds of operators are used.

  Create an alien class

make an Alien class. Include at least three protected data members of your choice for each data field and toString () method that returns a String containing a complete description of the Alien. Save the file as Alien.java

  What subsystems were involved in this problem

Think about the most difficult troubleshooting problem you've encountered in your recent experience- one where the solutions was not straightforward and where the problem was into a simple request for information.

  State diagram for coffee machine controller

Raw behavioural specs utilizing the state diagram for the coffee machine controller explained as follow. State events, State actions.

  Write down a test application named simpledatetest

design a class called SimpleDate that includes three instance variables - a month, a day and a year (all type int). Provide a constructor that initializes the three instance variables and validates that those values are correct (follow calendar ru..

  Various counter controlled repetitive control structures

Write down the example that demonstrates different techniques of passing arguments: by value, by reference, and as pointers. Discuss the three methods.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd