The scenario description and requirements

Assignment Help Computer Networking
Reference no: EM13992653

Description: The scenario description and requirements for Short Paper #2:

Prepare a short research paper of approximately 900-1000 words, double-spaced, exclusive of cover, title page, table of contents, [actually cover/title page and TOC are not required] endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word document.

Also submit the paper to Turnitin.com but while submitting toTurnitin.com do not include the certificate, title page, table of content and references. Both submissions are required

Scenario: Sandra changes banks following her troubles with MBT. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system. Sandra creates a key pair and supplies to Fiona, an officer of UST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a thumb drive which he keeps locked in a wall safe at her home. In turn, Fiona gives Sandra access to a key server maintained by UST so that she can readily obtain Fiona's current public key {eF, nF} whenever she needs to communicate securely with Fiona.

Things are fine for several months until Sandra sends Fiona a message m asking about current interest rates on Certificates of Deposit issued by UST. As shown below, she enciphers the message first, and then signs it

Where C is the encrypted message and m is the plaintext message.

A few days later, Sandra received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Fiona transferred the money out of Sandra's account into an account of her own in a bank on the Caribbean island of Nevis. When reached via long distance in Nevis, Fiona produced a message 'g'from Sandra saying: "Thanks for your excellent service, Fiona. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Sandra."

Sandra files suit against Fiona, UST and the government of the Nevis, claiming that the message was a forgery sent by Fiona herself, asking for triple damages for pain and suffering. Fiona has responded by claiming that all procedures were followed properly and that Sandra is filing a nuisance suit.

You have been employed by UST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Sandra issue. You obtain Fiona's private key from the UST server, and the cipher text C, and calculate

Where g is the plain text message which was obtained the cipher text C..

Your report to the UST Board of Directors should address the following issues:

  • From the facts as presented what can be determined about Sandra's intentions to make Fiona a gift of $1,000,000? How did the fact help you in forming your conclusion?
  • What is the significance of Nevis Island?
  • What is the significance of Sandra's message to Fiona asking for interest rates?
  • Assuming UST wishes to continue using RSA as its cryptographic system, what UST and Sandra could have done to protect against this controversy arising?
  • How to proceed in the litigation

Your report should clearly address these issues including recommendation for the Sandra's suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Sandra, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works

Reference no: EM13992653

Questions Cloud

What are the value of the resistance : A resistance is connected to a AC source with an rms output of 12 V and a frequency of 60 Hz, the rms current is found to be 2.4 A. When a capacitor is connected in series in this circuit the current drops to 1.4 A. What are the value of the resis..
Sbc ebit and net income : SBC pays interest on its debt equal to $30,000 per year and its marginal tax rate is 35 percent. (a) Compute at SBC's DOL, DFL, and DTL. (b) If sales turn out to be $588,000 rather than $560,000, what will be SBC's EBIT and net income?
Make changes to the appearance of text : Make changes to the appearance of text or objectsMake changes to the appearance of text or objects
Hedged outcome of this accounts receivable : If the premium on the option is $0.005 per C$, what is the hedged outcome of this accounts receivable?
The scenario description and requirements : Prepare a short research paper of approximately 900-1000 words, double-spaced, exclusive of cover, title page, table of contents, [actually cover/title page and TOC are not required] endnotes and bibliography. Your paper must use APA formatting with ..
What angle will the package hit its target : A rescue plane flies at an altitude of 400m above the ground. The plane is traveling with a constant vertical speed of 300km/h. A package is released 300m before the target. What vertical velocity should the package be given so that it arrives prec..
Annualized rate of return on transaction : The present exchange rate of€ is $1.1550. If the treasurer deposits the amount in a euro account after buying euro in the spot market and sells the proceeds three month later at $1.1530, what is the annualized rate of return on this transaction?
Problem regarding the sustainable growth rate : a. What is its sustainable growth rate? b. What must its profit margin be in order to achieve its sustainable growth rate?
State two ways in which the sports centre staff : State two ways in which the sports centre staff could breach the Data Protection Act.

Reviews

Write a Review

Computer Networking Questions & Answers

  1a critical review of theories of the nature of

1.a critical review of theories of the nature of organisational culture including how it may impact on innovation and

  Describe the protocols and functions of each layer in detail

ISO/OSI Network Reference Model- Define and explain the model including the seven layers for the ISO/OSI Network Reference Model. Describe the protocols and functions of each layer in detail

  What would be the utilized the best in todays industry

Which of the security enhancements do you think is the most important, and why and dDiscuss your thoughts on what would be the utilized the best in today's industry. Do you feel it is ground-breaking technology?

  Data Network Identification Code

Discuss the christian concept of trinity and messiah How many digits of the DNIC (Data Network Identification Code) identify the country?  A station in a network forwards incoming packets by placing them on its shortest output queue. What routing al..

  Compute theoretical maximum channel capacity-telephone lines

Given the narrow (usable) audio bandwidth of the telephone transmission facility, nominal SNR of 56 dB (400,000), and a distortion level of

  What version of http is the server running

List and discuss the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.

  Spanning tree protocol

Its primary purpose is to determine the configuration of devices and to allow different network-layer protocols to learn about each other. Using deductive reasoning, provide three (3) examples that demonstrate the value of CDP when troubleshooting..

  How many periodic, expiration running in router x

Assuming no other route update message has been received, show the updated routing table after router X has received the RIP message shown below from router C after 200s.

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Explaining role of antennas in transmitting radio waves

Explain role of antennas in transmitting radio waves. What kind of antenna is typically used in wireless LAN?

  Prepare a budget for the whole project

Prepare a budget for the whole project in terms of the cost of procurement, deployment, man power, scalability, security etc and prepare a time line which will serve as a guideline for you and your client.

  Wireless network coverage and other issues

In this assignment, you will compare and contrast wireless network coverage and other issues involved in the selection of a wireless provider and a mobile ad hoc networks (MANET).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd