Create a new encryption algorithm

Assignment Help Computer Network Security
Reference no: EM132997006

CyberSecurity and computer science.

Based on symmetric and asymmetric encryption, is it possible for potentially dishonest players to play a fair game of poker without using a traditional card deck or a trusted third party? This game of poker will be a traditional 5-card stud, whereas each player receives 5 cards and the player with the best poker hand wins. In a physical card game, players would be sitting at the same table, able to view shuffling and dealing actions. In this exercise, consider the players are not physically present.

This exercise requires players to exchange digital communications, to ensure a fair deal and also verify the outcome ensuring none of the players have cheated. Your task is to develop a protocol (series of exchanges) to ensure a fair shuffle and deal where no players can cheat by manipulating or observing the electronic deck. Use the following abbreviation for the 4 players:
A = Alice
B = Bob
C = Charlie
D = David

You don't need to create a new encryption algorithm. I'm not asking about AES, RSA, DES, etc. The actual encryption algorithm is irrelevant. The protocol is the method (sequence) of encryption actions so that multiple players can ensure not cheating will take place.

Reference no: EM132997006

Questions Cloud

Is possible to get a truly fair in the united states : Is it possible to get a truly fair and impartial trial in the United States? Identify and explain three procedural safeguards that are in place to make sure
What is the expected return on RKP : The risk-free rate of return is currently 0.02, whereas the market risk premium is 0.07. If the beta of RKP, Inc., stock is 1.4, then what is expected return
How does amendment impact daily life from a professional : Which amendment from the Bill of Rights do you believe is the most important and has had the largest impact on society today? Why?
Explain the differences between cash basis and accrual basis : Apply the knowledge that you have learned from Lecture 4, using an example to explain the differences between cash basis and accrual basis accounting
Create a new encryption algorithm : Create a new encryption algorithm. I'm not asking about AES, RSA, DES, etc. The actual encryption algorithm is irrelevant. The protocol is the method
Why would an agency tend to misreport to the programs : Based on your opinion, when a law enforcement agency uses federal reporting methods (UCR, NIBRS, etc.), what ethical issues can arise?
Do you agree with Vinex president statement : From the point of view of the reported net operating income for the year, do you agree with Vinex president's statement
Outline and prioritize the goals of the plan : Outline and prioritize the goals of the plan and proposed change. How will you prioritize and manage the tasks, resources, and tools within the project?
What is the total free cash flow in year two : You are valuing a project with the following estimates for year 2: Taxable Income (EBIT) 50. What is the total free cash flow in year two

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find the flag that will also display data-link headers

Enterprise Application Security - you will have to download and install a well known security (software) tool -Snort - on your own computer

  How to form the trojan integrated cirucit

How to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the output

  How many keys are there in this compound cipher

An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?

  Mobile computing has dramatically changed how information

mobile computing has dramatically changed how information is accessed and shared. wireless networking has been an

  What is the decrypted plaintext

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  Listing the pros and cons of each solution

Explain a paragraph how that can be an issue. Research U.S. Federal Regulations that govern exporting encryption technology on the Internet for more information on this topic if necessary.

  Cons of digital literacy on cyber bullying

You need to prepare a paper on Cons of digital literacy on cyber bullying. I need ten points on this topic as I have to do presentation in college.

  Potential threats and mitigation tools for ransomware

Overview of Network Security - Potential threats and mitigation tools for ransomware - Analyse and discuss common emerging threats, attacks, mitigation

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  The hr department has sensitive information

The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

  What is the equilibrium weekly wage and quantity of teachers

What is the equilibrium weekly wage and quantity of teachers in each school? What is the pay difference between the two schools?

  Developing a security evaluation process

You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd