Design a scheme to prevent messages from being modified

Assignment Help Data Structure & Algorithms
Reference no: EM131459661

Scenario Assignment: Cryptography

Review the following questions and provide your responses in a Word document. In answering each prompt, be sure to defend your answers and explain how you have arrived at your solution.

1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why does this not solve the problem?

Hint: We know of a protocol that uses this technique in an attempt to gain security.

2. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key, K, then Bob could impersonate Carol to Alice (actually any of the three could impersonate the other to the third). Suppose instead that each had their own secret key; so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her identity, responds to a challenge with a function of his or her secret key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol's answer to Alice's challenge?

3. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key and for which the only way to break it is a brute-force attack of trying all possible keys. Then, suppose the performance for the good guys is adequate (e.g., it can encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size key. Finally, suppose advances in computer technology make computers twice as fast. Given that both parties--- the good guys and the bad guys--- get faster computers, does this advancement in computer speeds work to the advantage of the good guys? The bad guys? Or does it not make any difference?

In each of your responses to the above scenarios, please ensure that you provide a brief explanation of why you chose to take your mentioned actions.

Guidelines for Submission:Your responses for each prompt must be submitted as 3 to 4 four paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. (graduate courses). Make sure you cite if you take a piece of someone's work, very important and your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references. No heavy paraphrasing of others work.

Reference no: EM131459661

Questions Cloud

Choose three of these seven listening selections above : Choose three of these seven listening selections above and compare their compositional techniques.
Prepare a bank reconciliation at 31 january 2015 : ACCG101 Assignment - perform a variety of activities and transactions in MYOB and - Prepare a bank reconciliation at 31 January 2015
Why may high-end motherboard have less of integrated feature : which keep the cost of building a new system low. Why may a high-end motherboard, especially gaming motherboards, have less or more of these integrated feature?
What is a wholesaling intermediary : Distinguish among the different types of manufacturer-owned wholesaling intermediaries. What conditions might suit each one?
Design a scheme to prevent messages from being modified : Design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message.
What is direct mail : What is direct mail? Direct mail is a form of direct marketing that includes sales letters, postcards, brochures, booklets, catalogs, house organs, and DVDs.
Describe the group development process : Describe the group development process, listing the stages in order and discussing what goes on in each.
Opportunities for women in the military : How might the end of the automatic ground combat exclusion affect opportunities for women in the military?
Analyze the role cryptographic algorithms play : Analyze the role cryptographic algorithms play; you will go into depth on this topic in your first milestone assignment. How these algorithms could be utilized.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd