Alice and super secure bank

Assignment Help Basic Computer Science
Reference no: EM133117454

Alice and Super Secure Bank

Alice, a high net worth customer, banks on-line at Super Secure Bank (SSB) and has agreed to use 3DES in communicating with SSB. One day, Alice received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Bob, transferred the money out of Alice's account and into an account of his own in an offshore bank. When reached via long distance in the Cayman Islands, Bob produced a message from Alice, properly encrypted with the agreed upon 3DES keys, saying: "Thanks for your many years of fine service, Bob. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Alice."

Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for damages for pain and suffering. Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. You have been employed by SSB as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter.

1. What can be determined from the facts as presented about whether Alice intended to make Bob a gift of $1,000,000?

2. Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?

3. Would this controversy have arisen if SSB had been using AES rather than 3DES?

Reference no: EM133117454

Questions Cloud

President obama vs president trump cybersecurity strategy : President Obama's 2009 Cybersecurity Strategy versus President Trump's 2017 Cybersecurity Strategy
Compare two significant international laws : Research and compare two significant international laws that relate to the practice of information security.
Detecting disaster projects : Discuss how the list of failure modes from the article "Detecting Disaster Projects" led to that failed project.
Business redesign : Discuss what went right during the redesign and what went wrong from your perspective.
Alice and super secure bank : Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?
Discussing concept of risk modeling : Discussing the concept of risk modeling. Please also evaluate the importance of risk models.
Experienced in your professional or para-professional life : Describing a specific group or team situation you have experienced in your professional or para-professional life
Is blockchain technlogy disruptive platform : What is blockchain technology, and how can it be used in organizations and industries to create value? Is blockchain technlogy a disruptive platform?
Cybersecurity-network errors-website accessibility : Explain your main idea (such as cybersecurity, network errors, website accessibility, etc.) and why it is of interest to you.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Problem on the functional programming

Functional programming with map(). Write a program that takes a file name and "cleans" the file by removing all leading and trailing whitespace from each line.

  What is the hypothesized population proportion

What is the hypothesized population proportion for this test?

  Identify physical and logical network components

Identify physical and logical network components. Describe the processes involved in running a datacenter.

  How To Hide The IP Address

How To Hide The IP Address? Hide your identity from your competitors. Hide your geographic location. Prevention of tracking by site owners

  Strategic objectives of operation

The objectives of any layout depends on the strategic objectives of an operation.

  Agile project management

Explain what your iteration 0 would accomplish after your feature-story example is released.

  Differential impact on firm downside risk

Discuss whether different types of IT investments have a differential impact on firm downside risk.

  Public accessor and mutator methods and private variables

1. True or False? Data persistence means an application can store on some storage media for later access.

  Write web app in php that asks the user

Write web app in PHP that asks the user to enter the square feet of wall space to

  New technology and software into the business environment

Incorporating the new technology and software into the business environment to remain competitive continues to be a challenge for organizations.

  Population growth rate

The savings rate, s; the population growth rate, n; the growth rate in technological progress and knowledge, g; and the rate of depreciation of physical

  Researchers be cautious about using secondary sources

Why should researchers be cautious about using secondary sources? Paraphrases in academic work require APA in-text and reference citations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd