Define how to use a web browser and an email client

Assignment Help Computer Engineering
Reference no: EM131722408

Alice and Bob want to communicate securely in the presence of a very powerful active adversary
(Eve). Eve can monitor all the connections that Alice and Bob use at home, at work, through their
mobile phones, at coffee shops, etc. Eve can also compel companies such as Google or Microsoft to
disclose the information they have on Alice and Bob (e.g., the content of their Gmail or Outlook.com
accounts).

Present one set of steps that Alice and Bob can take to communicate securely and undetectably
in the presence of this adversary. In particular, Alice and Bob want to make sure that Eve does not
find out that they are communicating. Further, if Eve detects messages between Alice and Bob,
she must not be able to tell what the two parties said. Clearly describe each step, and explain why
it is necessary and what it accomplishes.

In defining the steps that Alice and Bob will take, consider the following:

1. Alice and Bob are not allowed to use Tor.

2. Alice is a security expert, but Bob only knows how to use a web browser and an email client.

Therefore, the must be as simple as possible to minimize the chances that Bob makes any mistake that will allow Eve to know about their exchanges.

3. Alice can secretly meet with Bob once, and she can instruct Bob on how to communicate during that meeting. After that, all messages must be exchanged online.

4. Alice and Bob want to minimize the metadata they are producing. They do not want to leave any trace that they communicated, and they don't mind erasing messages after they receive them.

5. Both parties have access to a computer they just purchased from a local shop, and that is therefore not compromised by Eve.

Discuss what mistakes Bob can make that will jeopardize the ability of the parties to communicate securely and undetectably.

Be creative, but keep the approach as simple as possible in order to minimize the chances of making mistakes. Any set of steps that can be easily remembered by Alice and Bob, who therefore do not need to write down any note, is preferred. However, this is not necessary.
Items to Submit

1. Academic integrity form

2. Two-page report as a PDF document

Items not to Submit

Anything not mentioned under items to submit. For example, do not submit:

• Code

• Program binaries

• Keys

• Word, RTF, or OpenOffice files

Reference no: EM131722408

Questions Cloud

Create strategies to advance your career using your strength : Create strategies to advance your career using your strengths. How can you use goal-setting to increase motivation and improve job performance?
Complete the journal entries : Complete the journal entries: On 1/1/2016 Debbie Smith Corporation issued 180 shares of $4 Par value Common Stock for $6200
Component force and the tension acting on the bob : The mass of the bob is made to rotate in a horizontal circle of radius 0.4metres and whose center is vertically below the point of suspension.
Define name of fallacy for the invalid statement : Some pleasant recollections are not missed opportunities. Therefore, some availed opportunities are not unpleasant recollections.
Define how to use a web browser and an email client : Alice is a security expert, but Bob only knows how to use a web browser and an email client
What is the current through the bulb : 1. There is a light bulb in a 120. V circuit with a resistance of 100. ohms. What is the current through the bulb?
Possible to plan and manage every possible risk to project : Do you think it is possible to plan and manage every possible risk to a project? Why or Why not?
Nikola tesla and thomas edison : Amongst science scholars, few debates get more heated than the ones that compare Nikola Tesla and Thomas Edison. So, who was the greater inventor?
How to organize and lead a cross-departmental : How to organize and lead a cross-departmental, multi-disciplinary team to improve coordination, efficiency,

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd