### Security vulnerability

Assignment Help Computer Engineering
##### Reference no: EM131689

Question 1. Alice and Bob are sending a message m to each other

a) Give one method to achieve confidentiality for m.

b) Give one method to achieve integrity but NOT confidentiality for m

Question 2. Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw a diagram only to describe the message exchange and the content of each message.

Question 3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Show the entire mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Show the entire mathematical steps)

Question 4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Assume the encryption is absolutely unbreakable.

a) Can B be reasonably sure that the message is generated by A? Why?

b) If B shows another person C that B can use the key k to decrypt the message, can C be reasonably sure that the message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C can be reasonably sure that the message is indeed generated by A?

Question 5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following questions:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If the length of the key is doubled, what is the amount of time required to decrypt the message with brutal force? Why?

Question 6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts the cipher text and retransmits c1-c3-c3-c4, what will be the "plain text" blocks being decrypted into?

#### Questions Cloud

 Financial accounting system : How can the conventional financial accounting system be made to serve the purpose of operational control Implement the delivery company : Implement the delivery company using the classes given in the class diagram above. Write a complete c++ program : The main program will read in a parameter value n (read this in main). Then it will call a function read2arrays (details below) to read lists of grades into two arrays, which the main program will call test1 and test2 (or some other names of your .. Prepare an arbitrary sinusoidal waveform : Create a program to compute the derivative of an arbitrary input function, with arbitrary duration and arbitrary limits Security vulnerability : What is the security vulnerability of this solution Using the irvine32 library functions : Create 32 random points which have (x, y) co-ordinates Prepare a planning memo for the tlc engagement : Prepare a planning memo for the TLC engagement based on the information provided in the case. Evaluate the gross profit : Evaluate the gross profit Overview of the situation/accounting issue : You will be asked to address a accounting failure from AMERICAN INSURANCE GROUP. Overview of the situation/accounting issue

### Write a Review

#### Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

#### Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

#### Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

#### Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

#### What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

#### Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

#### Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

#### Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

#### Security policy document project

Analyze security requirements and develop a security policy

#### Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

#### Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

#### Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices