Several cryptography experts

Assignment Help Basic Computer Science
Reference no: EM132716767

While man-in-the-middle attacks are nothing new, several cryptography experts have recently demonstrated a weakness in the popular e-mail encryption program PGP. The experts worked with a graduate student to demonstrate an attack which enables an attacker to decode an encrypted mail message if the victim falls for a simple social-engineering ploy.

The attack would begin with an encrypted message sent by person A intended for person B, but instead the message is intercepted by person C. Person C then launches a chosen cipher text attack by sending a known encrypted message to person B. If person B has his e-mail program set to automatically decrypt the message or decides to decrypt it anyway, he will see only a garbled message. If that person then adds a reply, and includes part of the garbled message, the attacker can then decipher the required key to decrypt the original message from person A.

The attack was tested against two of the more popular PGP implementations, PGP 2.6.2 and GnuPG, and was found to be 100% effective if file compression was not enabled. Both programs have the ability to compress data by default before encrypting it, which can thwart the attack. A paper was published by Bruce Schneier, chief technology officer of Counterpane Internet Security Inc.; Jonathan Katz, an assistant professor of computer science at the University of Maryland; and Kahil Jallad, a graduate student working with Katz at the University of Maryland. It was hoped that the disclosure would prompt changes in the open-source software and commercial versions to enhance its ability to thwart attacks, and to educate users to look for chosen cipher text attacks in general.

PGP is the world?s best known e-mail encryption software and has been a favorite since Phil Zimmermann first invented it in 1991; it has become the most widely used e-mail encryption software. While numerous attacks have been tried, none have yet succeeded in breaking the algorithm. With the power of computers growing exponentially, cracking this or even more modern algorithms is only a matter of time.

1. What can be done to increase the time required to break an encryption algorithm?

2. What is often the trade-off when using more complex algorithms?

3. Phil Zimmermann had to face considerable resistance from the government before being allowed to distribute PGP. What were their concerns, and why did they finally allow its eventual release?

4. Think of other social engineering schemes that might be employed in an effort to intercept encrypted message

Reference no: EM132716767

Questions Cloud

What are the qualifications of a chieftain : What are the qualifications of a chieftain, do you think these qualifications apply to some of the government officials today? Explain further.
Research at least two articles on topic of big data : Research at least two articles on the topic of big data and its business impacts.
What is the direct labor rate variance : If 15,000 units used 61,800 hours at an hourly rate of $19.85 per hour, what is the direct labor (a) rate variance? (b) time variance? (c) cost variance
Understand that sex and gender are different : After watching, do you better understand that sex and gender are different, and that gender is just something socially constructed?
Several cryptography experts : Several cryptography experts have recently demonstrated a weakness in the popular e-mail encryption program PGP
Address issues of social class : Go to the following website and listen to Elna Baker's 16-minute segment of the This American Life podcast entitled, "Babies Buying Babies."
Determine variable factory overhead controllable variance : The actual variable factory overhead was $52,770. Determine the variable factory overhead controllable variance
Determine the fixed factory overhead volume variance : Bellingham Company produced 15,000 units of product that required 4 standard direct labor hours per unit. Determine the fixed factory overhead volume variance
Industry experts believe blockchain is technology : Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discussed managing complex systems

Discussed managing complex systems and chapter 15 introduced the advantages of visual decision support.

  What is a downside of using bagging

How does bagging contribute to a reduction in the prediction error?

  Store the passwords in the clear in the db

Assume you are writing and application that requires you to store the user password in a database (DB). What should you do?

  Digital signature algorithm

Are discrete logarithms fundamental to the Digital Signature algorithm (DSA) and the Diffie-Hellman key exchange algorithm ?

  Write a program to create a file that lists the presidents

The first two lines of the file will be Abraham Lincoln, 5; Andrew Jackson, 5. The file Justices.txt is used for the list. I need this solved in Visual Basic.

  Are there any potential problems with removing this variable

The authors chose to remove Pressure from the model based on the LRTs. Based on your results, discuss why you think this was done. Are there any potential problems with removing this variable?

  Create python program

Describe how you would create a Python program that calculates the exact amount of change to give a customer in denominations of quarters, dimes,

  Suggest one other way to accomplish the same objective

What is the purpose of these rules? Suggest one other way to accomplish the same objective.

  Transmitting confidential information

For this Discussion, consider the following scenarios that involve transmitting confidential information: A mid-sized company has about 250 employees and needs to transmit employee payroll data to the vendor that manages employee contributions towa..

  Digital forensic best practices

Provide at least one example of how being familiar with and following digital forensic best practices, AND criminal justice standards would benefit you

  Find on what day a specific date falls

1: Find on what day a specific date falls. 2: Display the twelve month calendar for a given year. Option: Depending on the given option, the program asks user to enter valid mm dd yyyy or just yyyy and call the necessary functions to print out the..

  Describe significant clinical issue

Describe a Significant Clinical Issue. Please review a current literature and provide an article that relates to the topic.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd