What is the purpose of including message authentication code

Assignment Help Computer Engineering
Reference no: EM131722756

Order the following four items to match with the process of digital signature generation and verification: (circle one)

1. Encrypt the digest with your private key.

2. Compare the message digest to one you created.

3. Generate a message digest.

4. Decrypt the signature with the sender's public key.

A. 4, 2, 1, 3
B. 1, 4, 3, 2
C. 3, 1, 4, 2
D. 3, 4, 2, 1

2. What is the purpose of including Message Authentication Code (MAC) with the message?

3. What is the difference between a MAC and a HMAC?

4. Who generates the authenticator in Kerberos and what is the purpose of the authenticator?

5. What primary problem does public-key cryptography solve?

6. Which of the following statements are true about Diffie-Hellman (D-H) key exchange?

A. The security of the scheme depends on it being difficult to solve ax = b mod n for a given b, n and x
B. The security of the scheme depends on it being difficult to solve ax = b mod n for x given a, b and n

7. Suppose a One-way hash function is used in a message exchanged between Alice and Bob.

A. Provide an example forgery scenario if the hash function lacks weak collision resistance property.

B. Provide an example forgery scenario if the hash function lacks strong collision resistance property.

8. A. Decrypt the following English cipher-text which has been produced by using substitution (Caeser) cipher:
kbkxeutk (Hint: Use the frequency distribution table of the letters of English language and the Vigenere Tableau given at the end of this script)

B. Consider a substitution cipher where 52 symbols were used instead of 26. In particular, each symbol in the cipher text is for either a lowercase English letter, or an uppercase English letter. For example, let E be the encryption function then we could have E(A) = T and E(a) = m. Such a modification augments the key space to 52! (52 factorial). Does this provide added security compared to a standard substitution cipher? Why or why not?

9. Suppose Alice wants to send a message to Bob containing her name N, her computers IP address IP, and a request R for Bob. Design encrypted messages that Alice must send to meet the security requirements below. Suppose that K-A and K-B are the private keys of Alice and Bob respectively.

Assume that Alice and Bob share a symmetric key K and have securely distributed their public keys K+A and K+B to each other. Assume that all the messages include Alice's name, IP address, and the request.

Recall the notation that x||y means the concatenation of x with y, {x}k denotes the encryption of x using key k, and that h(x) denotes a hash of x. Using the notation above, answer each question below using a message exchange diagram (like the ones we used in class), being specific about what is computed, what is transmitted, and who the sender and receiver of the message is.

A. Using the symmetric key, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

B. Using the symmetric key, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages
integrity and source.

C. Using public key cryptography, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

D. Using public key cryptography, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages integrity and source.

10. A. Illustrate how Meet-in-the-Middle attacks can be devised with a double DES encryption scheme? How does 3DES protect against this attack.

B. Explain the self-healing property of cipher block chaining mode.

11. A. Perform encryption and decryption using the RSA algorithm where p = 3, q = 11, e = 7, and M = 5.

B. Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root g = 2.

i) If user A has public key Ya = 9. What is A's private key Xa?

ii) if user B has public key Yb = 3, what is the shared secret key K?

12. A. A system allows the user to choose a password with a length of one to five characters, inclusive. Assume that 10,000 passwords can be tested per second. The system administrators want to expire passwords once they have a probability of 0.10 of having been guessed. Determine the expected time to meet this probability under the condition that the password characters may be any number from 0 to 9.

B. Does using passwords with salts make attacking a single account more difficult than using passwords without salts? Explain why or why not.

Reference no: EM131722756

Questions Cloud

Reflecting on the four modules completed this session : Reflecting on the four modules completed this session, identify the specific readings, assignments, and discussions you found most valuable and enjoyable.
Make an inference about the population : Suppose the psychologist actually observes y¯ = 6.2. Based on your answer to part a, make an inference about the population from which the sample was selected.
Where are there breaches of ethical behavior : hink about the evidence that helps to make your case and use it. Address the following questions: What are the ethical issues?
Combining choppy sentences : Combine each pair of sentences by subordinating minor ideas or by coordinating ideas of equal importance.
What is the purpose of including message authentication code : What is thec (MAC) with the message?
Construct a stem-and-leaf display for light loss percentage : Eclipses of Saturnian satellites. Saturn has five satellites that rotate around the planet. Astronomy (August 1995) lists 19 different events involving.
How to address an employee sexual harassment complaint : How to address an employee sexual harassment complaint? Review the article titled How Do I Plan a Human Resource Training Program in an Organization Setting?
Congressional aspirants who desire to think : The creation of a third political party-the independent party-would allow Congressional aspirants who desire to think for themselves to claim
Avoid that particular poison taste in the future : That's because some rats eat enough poison to die but others eat only enough to become sick and then learn to avoid that particular poison taste in the future.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd