Describe a meet in the middle attack

Assignment Help Computer Network Security
Reference no: EM131110087

1. Answer the following questions briefly
a. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.

b. What is social engineering? Briefly discuss 3 different social engineering exploits to steal someone's password?

c. If you are given a hash function (say SHA-1), design one-time password scheme for access control to your server. (Hint: You should specify details on how you will generate the passwords maintain them)

d. Describe a covert channel? Give an example and comment on the speed of the covert channel in your example.

e. As we discussed in class, early implementations of RSA, used a common e= 3. What was the security limitation of this choice? Instead, if one were to fix a common d =3 what is the security implication?

2. Consider the Elliptic curve
E: y2 = x3 + 11x + 19 (mod 167)
Suppose E and point P (2, 7) are used for ECC Diffie-Hellman key exchange.
Alice chooses the secret value A = 12 and Bob chooses the secret value B = 31.
a. What value will Alice send to Bob?
b. What does Bob send to Alice?
c. What is the shared secret at the end of the exchange?


3. For this problem you need to run MD5. You may either download a certified version of MD5 or use web-based MD5 services. You should specify what you used; for example, give the URL.
You are given a sentence "Your_Last_Name" loved 7339
a. Generate a hash for the above sentence by selecting the last 4 bits from the MD5 hash
b. Perform a birth-day attack to change the sentence to "Your_Last_Name" hated 7339


4. You are given a password file containing 64 random passwords each of which are 6 characters long where each character can assume 128 different values.
If you were to attack this password file, what is the complexity of attack for the following scenarios:
a. Brute force attack to find Alice's password
b. Brute force attack to find somebody's password
c. Attack to find Alice's password with a dictionary containing 1024 chosen passwords
d. Attack to find any password with the same dictionary

Reference no: EM131110087

Questions Cloud

Why does the mirror image rule still apply : Why does the Mirror Image rule still apply in certain business scenarios? Why has the UCC largely discarded the mirror image rule, while it still persists in various parts of the common law
Calculate the implied price of each warrant for each : Calculate the implied price of each warrant for each of the bonds shown in the followingtable.
Identify the potential sources of conflict among managers : As the new Vice President of Operations for a chain of movie theaters, you have identified a high level of conflict among the managers of individual theaters about which theater has priority to show first-run films, which managers have more influe..
How is a proof by induction similar to conditional linear : How is a proof by induction similar to conditional linear recursion?
Describe a meet in the middle attack : 1. Answer the following questions brieflya. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.
What kind of case is this civil or criminal : Facts: Maria Kerkoulas owned the Pub Zone bar, frequented by many motorcycle gangs, and knew from her own experience and conversations with police that some of the gangs, What kind of case is this, civil or criminal
Describe the organizational structure of xecodynamics : Describe the organizational structure of Xecodynamics. What are the advantages and disadvantages of the current organizational structure? If Xecodynamics remains a standalone company, what indicators will signal to the leadership team that a chang..
Create a simple alice world with a few objects : Create a simple Alice world with a few objects of your choice, including a character that you create with hebuilder or shebuilder, and create both iterative and recursive methods to make the character walk to a target object.
Prepare jennifer brent corporation''s 2011 journal entries : Jennifer Brent Corporation owns equipment that cost $80,000 and has a useful life of 8 years with no salvage value.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd