What is the purpose of including message authentication code

Assignment Help Computer Engineering
Reference no: EM131722756

Order the following four items to match with the process of digital signature generation and verification: (circle one)

1. Encrypt the digest with your private key.

2. Compare the message digest to one you created.

3. Generate a message digest.

4. Decrypt the signature with the sender's public key.

A. 4, 2, 1, 3
B. 1, 4, 3, 2
C. 3, 1, 4, 2
D. 3, 4, 2, 1

2. What is the purpose of including Message Authentication Code (MAC) with the message?

3. What is the difference between a MAC and a HMAC?

4. Who generates the authenticator in Kerberos and what is the purpose of the authenticator?

5. What primary problem does public-key cryptography solve?

6. Which of the following statements are true about Diffie-Hellman (D-H) key exchange?

A. The security of the scheme depends on it being difficult to solve ax = b mod n for a given b, n and x
B. The security of the scheme depends on it being difficult to solve ax = b mod n for x given a, b and n

7. Suppose a One-way hash function is used in a message exchanged between Alice and Bob.

A. Provide an example forgery scenario if the hash function lacks weak collision resistance property.

B. Provide an example forgery scenario if the hash function lacks strong collision resistance property.

8. A. Decrypt the following English cipher-text which has been produced by using substitution (Caeser) cipher:
kbkxeutk (Hint: Use the frequency distribution table of the letters of English language and the Vigenere Tableau given at the end of this script)

B. Consider a substitution cipher where 52 symbols were used instead of 26. In particular, each symbol in the cipher text is for either a lowercase English letter, or an uppercase English letter. For example, let E be the encryption function then we could have E(A) = T and E(a) = m. Such a modification augments the key space to 52! (52 factorial). Does this provide added security compared to a standard substitution cipher? Why or why not?

9. Suppose Alice wants to send a message to Bob containing her name N, her computers IP address IP, and a request R for Bob. Design encrypted messages that Alice must send to meet the security requirements below. Suppose that K-A and K-B are the private keys of Alice and Bob respectively.

Assume that Alice and Bob share a symmetric key K and have securely distributed their public keys K+A and K+B to each other. Assume that all the messages include Alice's name, IP address, and the request.

Recall the notation that x||y means the concatenation of x with y, {x}k denotes the encryption of x using key k, and that h(x) denotes a hash of x. Using the notation above, answer each question below using a message exchange diagram (like the ones we used in class), being specific about what is computed, what is transmitted, and who the sender and receiver of the message is.

A. Using the symmetric key, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

B. Using the symmetric key, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages
integrity and source.

C. Using public key cryptography, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

D. Using public key cryptography, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages integrity and source.

10. A. Illustrate how Meet-in-the-Middle attacks can be devised with a double DES encryption scheme? How does 3DES protect against this attack.

B. Explain the self-healing property of cipher block chaining mode.

11. A. Perform encryption and decryption using the RSA algorithm where p = 3, q = 11, e = 7, and M = 5.

B. Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root g = 2.

i) If user A has public key Ya = 9. What is A's private key Xa?

ii) if user B has public key Yb = 3, what is the shared secret key K?

12. A. A system allows the user to choose a password with a length of one to five characters, inclusive. Assume that 10,000 passwords can be tested per second. The system administrators want to expire passwords once they have a probability of 0.10 of having been guessed. Determine the expected time to meet this probability under the condition that the password characters may be any number from 0 to 9.

B. Does using passwords with salts make attacking a single account more difficult than using passwords without salts? Explain why or why not.

Reference no: EM131722756

Questions Cloud

Reflecting on the four modules completed this session : Reflecting on the four modules completed this session, identify the specific readings, assignments, and discussions you found most valuable and enjoyable.
Make an inference about the population : Suppose the psychologist actually observes y¯ = 6.2. Based on your answer to part a, make an inference about the population from which the sample was selected.
Where are there breaches of ethical behavior : hink about the evidence that helps to make your case and use it. Address the following questions: What are the ethical issues?
Combining choppy sentences : Combine each pair of sentences by subordinating minor ideas or by coordinating ideas of equal importance.
What is the purpose of including message authentication code : What is thec (MAC) with the message?
Construct a stem-and-leaf display for light loss percentage : Eclipses of Saturnian satellites. Saturn has five satellites that rotate around the planet. Astronomy (August 1995) lists 19 different events involving.
How to address an employee sexual harassment complaint : How to address an employee sexual harassment complaint? Review the article titled How Do I Plan a Human Resource Training Program in an Organization Setting?
Congressional aspirants who desire to think : The creation of a third political party-the independent party-would allow Congressional aspirants who desire to think for themselves to claim
Avoid that particular poison taste in the future : That's because some rats eat enough poison to die but others eat only enough to become sick and then learn to avoid that particular poison taste in the future.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Standard apis supported by the jaxp

Explain two standard APIs supported by JAXP (Java API for XML processing) and provide a comparison between two mechanisms.

  Creating a simulator that maintains coherent caches

CS 4290/6290, ECE 4100/6100 - Spring 2017 Project - Cache Coherence. In this project, you will be creating a simulator that maintains coherent caches

  The decades to include various methodologies

The System Development Life Cycle has developed over the decades to include a variety of Methodologies. Each of these Methodologies utilizes the same methods in a different way. define the primary SDLC Methodologies, their advantages and disadvant..

  Evaluate the coding artifacts in mpeg encoding

Evaluate the coding artifacts (showing up as video noise) in MPEG encoding. Provide the following details: (i) the signal characteristics of video noise (ii) the causes of the video noise, and, (iii) suggest methods to reduce the video noise.

  Questionyou work for a small company that is having trouble

questionyou work for a small company that is having trouble with its two domain controllers. describe how you would

  Providing access to the user

Explain the other questions you would ask? Will you think of any other ways to estimate this? How will you verify that the user requires this access?

  Demonstrate three multimedia applications

The seminar mentions that many tools already exist for deployment of multimedia applications such like (Camtasia, Blender and Paint.NET). Select such a tool, present its uses, advantages and limitations. Demonstrate three multimedia applications t..

  Create a presentation that is appropriate for your audience

How will you create a presentation that is appropriate for your audience? How do you know how many slides to add for a 10-minute presentation?

  Define the use of contractions, slang and icons

Does the use of contractions, slang and icons in text messaging and email signal the development of a new communication style, or just the death of appreciation of written language.

  Soda vending machine design

Soda Vending Machine Design,    A state diagram showing the implementation of your design. Clearly show all the states and the conditions on which transitions occur.

  Initialize the array with the appropriate number of values

Initialize the array with the appropriate number of values - What is the value in the array element when the index contains 2

  Explain the differences between data voice and video

explain the differences between data voice and video signals in 200 to 300 words. include a description comparing the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd