Secure protocol

Assignment Help Basic Computer Science
Reference no: EM13246580

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory. This message needn't be encrypted since confidentiality is not important here, but the CEO needs to be guaranteed that the message really is from someone who knows the secret s (e.g. Alice) when the CEO opens his/her computer the next day. A naïve protocol to achieve this may look like this:
Alice-->Server: "This is Alice, I have an important message to forward to the CEO"
Server-->Alice: "OK, please encrypt R" (where R is a random nonce)
Alice-->Server: "Es(R)" (that is, R is encrypted with the secret s)
Server-->Alice: "Please send the message"
Alice-->Server: "The CEO needs to attend a meeting in Liverpool on May 1, 2006"
The server stores this message in the CEO's directory
Is this protocol secure? If not, how do you feel it could be modified to make it so?

Required minimum-1 page

Reference no: EM13246580

Questions Cloud

Determine the depletion capacitance per unit area : For a p+-n silicon junction, Na= 1 × 1017 cm-3 in the p-side and Nd= 1 × 1015 cm-3 in the n-side. Determine the depletion capacitance per unit area of cm2 at -4V.
Define the pentose phosphate pathway : Explain The pentose phosphate pathway is another possible direction for G-6-P. What are the two major products of the pentose phosphate pathway
Write a sum-of-products expression for the 8-1 multiplexer : The question considers the design of a 8x1 multiplexer using gates. Assume the data inputs are I0,...,I7 and the select inputs are S2, S1 and S0. (a) Write a sum-of-products expression for the 8x1 multiplexer.
Determine the length of wire : A piece of Nichrome wire has a radius of 5.50 10-4 m. It is used in a laboratory to make a heater that uses 3.00 102 W of power, estimate the necessary length of wire
Secure protocol : Assume that Alice shares a secret s with her company's server computer.
State ag write a balanced equation : for a particular redox reaction MnO2 is oxidized to MnO4- and Ag+ is reduced to Ag write a balanced equation
Explain what is the mass expressed in kilograms : If 842 pounds of Moon samples have been collected from lunar landings, what is the mass expressed in kilograms? (Given: 1 kilogram= 2.20 pounds).
Find force of friction between losing player feet and grass : A brave but inadequate rugby player is being pushed backward by an opposing player who is exerting a force of 800 N on him, What is the force of friction between the losing player's feet and the grass
Explain differentiate between pentanal and 3-pentanone : Which of the following tests could differentiate between pentanal and 3-pentanone, also what would occur.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The contenders are tortoise and hare

The contenders are Tortoise and Hare, and they begin race as investors at "tile 1" of 70 tiles The finish line is at 70 the tile. With each tick of the clock

  Which command displays network activity statistics for tcp

Which command displays network activity statistics for TCP, UDP, and IP? a. telnet b. nbtstat-s c. ping -s d. netstat -s e. nslookup

  Which type of exception would be written as the parameter

Which type of exception would be written as the parameter of a catch-clause if the try-clause is calling new and we want to check whether the free store has run out of space? 16. What do you call the following function? bool operator==(Name otherN..

  How to choose optimal location of pipeline for oil field

A Consultant is to lay oil pipeline running east to west through the oil field of n wells. From each well spur pipeline is to be connected directly to main pipeline along shortest path.

  Describe emerging technologies and trends

What technologies do you see becoming mainstream in the next 18 months, 5 and 10 years.

  What would be the financial advantage of a malware designer

What would be the financial advantage of a malware designer to create lots of different malicious code instances that all exploit the same vulnerability yet have different malware signatures?

  Discuss the issues of encryption and key management

Discuss the issues of encryption and key management in cloud computing, how it different for personal computers and traditional enterprising computing environments.(1300-1400 words)

  Find out the average cpi for the two executables compiled

Consider a program compiled using compilers A and B running on the same processor. Find out the average CPI for the two executables compiled by compilers A and B given that the processor has a clock cycle time of 1ns.

  How many bits are in each part include

Label all lines and show how many bits are in each part include how number of bits for offsets, etc are calculated please.

  Which particular software products are used at your company

Which particular software products are used at your company?

  Create logic circuit which will decode dtmf-like keypad

Create the logic circuit which will decode the DTMF-like keypad. The keypad comprises of 16 keys, numbered 0 to 9, *, #, A, B, C, and D.

  Write a program that reads in the length and width

Write a program that reads in the length and width of a rectangular yard (in meters) and the length and width of a rectangular house (in meters) placed in the yard.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd