Design a secure voting prototype

Assignment Help Other Subject
Reference no: EM132284901 , Length: word count:1500

PART-1

Q1. (Privacy-Preserving Computation)

Suppose there are 9 voters to vote for YES or NO to give their opinions.

Design a secure voting prototype as shown in Figure-Q1 using Paillier cryptosystem where the votes must be encrypted from Voting Booth before sending them to the Voting Server.

1409_figure.jpg

Figure-Q1: Secure voting system

Assume, five voters will vote for YES and four voters will vote for NO. The Voting Authority should find five YESs and four NOs after counting the votes. The Voting Authority chooses p=37, q=73 and select g=9868. The private numbers chosen by 9 voters and their votes are as follows:

Voter

No.

Voter's Private Number, r

Vote

Voting message,

m

1

20

YES

00010000 = 16

2

21

YES

00010000 = 16

3

22

YES

00010000 = 16

4

23

YES

00010000 = 16

5

24

YES

00010000 = 16

6

25

NO

00000001 = 1

7

26

NO

00000001 = 1

8

27

NO

00000001 = 1

9

28

NO

00000001 = 1

Show the encryption, homomorphic computations and decryption processes. [Hints: Refer to the lecture-5 Secure e-voting. You need to represent the total number of votes by 8-bit string. The first 4 (four) bits should represent the votes for YES and the rests for NO. When adding a vote for YES, the system adds 00010000, which is 16 in integer. Similarly, the system adds 00000001 when voting for NO, which is 1 in the integer form.]

Q2.

Suppose Bob and Alice, two business partners, use their smart phones to communicate with each other regarding their business decisions. Hence, their messages are very sensitive and require to be authenticated. Otherwise, an attacker, say one of their business rivals, may perform phone number porting fraud attack. In this attack, the attacker may use another SIM card to port Alice or Bob's phone number for pretending as Alice or Bob, respectively. Therefore, BoB and Alice uses digital signature scheme in their smart phone to sign messages for ensuring authenticity. The working procedure of the digital signature is illustrated in FigureQ2.

965_figure1.jpg

Answer Q2.1, Q2.2 and Q2.3 using the scenario mentioned above.

Q2.1

Suppose Bob (the sender) wants to send a message m=654321 to Alice (the receiver). However, before sending the message he would like sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses parameter p = 9973 and q = 7541, and chooses a suitable public key parameter

e=7321. How would Bob sign message m=654321? How would Alice verify the signed message from Bob?
[Hints: Refer to the lecture-6 and tutorial-6. You do not need to generate hash of the message m.]

Q2.2
Suppose Bob (the sender) wants to send a message m=9876 to Alice (the receiver). However, before sending the message he would like sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using ElGamal encryption algorithm and sends the public key to Alice. Bob chooses p=8369, g=3031, x=61. How would Bob sign message m=9876? How would Alice verify the signed message from Bob?

Q2.3
Suppose Bob (the sender) wants to send a large text message M to Alice (the receiver). You should download the text message file "Message.txt" from the CANVAS. The text message M is as follows:

The invention of computers in the 20th century revolutionized cryptology. IBM Corporation created a code, Data Encryption Standard (DES) that has not been broken to this day. Thousands of complex codes and ciphers have been programmed into computers so that computers can algorithmically unscramble secret messages and encrypted files.

Before sending the message, Bob generates a hash h(M) of the text message M using MD5 hash algorithm, and converts h(M) into integer message m. Then, he signs the m and sends it to Alice. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses the following parameters:
p = 330620674058481288123238031776544995151
q = 273416090781657641961913344431645866621

Bob chooses a suitable public key parameter e=37. How would Bob sign message M? How would Alice verify the signed message from Bob?

Q2.4
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.

Q3 (BlockChain Technology)

Write a well-organized report on how the blockchain technology can impact Smart Industry systems. Please consider the followings in your report sequentially:

a) Explain a motivating scenario of a smart industry where the blockchain can be applied.
b) Explain your understanding with necessary diagrams on how the specified
smart industry can be designed using blockchain.
c) Discuss some popular consensus mechanisms for blockchain. Among the popular consensus mechanisms, which one can be applied in your specified blockchain based smart industry and why? Justify your answer.
d) Explain how the integrity and traceability of smart industry data are obtained using blockchain in your specified scenario.
e) What are the advantages and disadvantages of using blockchain technology in your specified smart industry?

Q4 (Authentication Protocol)
The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptography algorithm that is used here is secure. Given that the following protocol does not provide mutual authentication. Give two different attack scenarios where Trudy can convince Bob that she is Alice. Briefly explain each attack scenario performed by Trudy with proper diagram which on the protocol.

1088_figure2.jpg

[Hints: You need to show two attack scenarios performed by Trudy with proper diagram on the protocol. Additionally, provide brief explanation of attacks to justify

your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.]

Q5 (OpenSSL and IPFS)

Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KAB) using OpenSSL, uploads the encrypted file in the IPFS-based repository, and receives a Unique Hash Identifier (UHI). Next, Alice encrypts KAB and UHI with Bob's RSA public key using OpenSSL and gets ciphertext C. Further, Alice generates a message digest M using OpenSSL with her RSA private key for the ciphertext C. Finally, Alice sends {M, C} to Bob through email.

Upon receiving them, Bob verifies the message digest M using OpenSSL with Alice's RSA public-key. If the verification fails, Bob discards further steps and informs Alice that the verification has been failed. If the verification is successful, Bob decrypts C using OpenSSL with his RSA private-key. If the decryption is successful, Bob retrieves the shared AES secret key (KAB) and unique hash identifier (UHI) for the file.

Bob downloads the file from IPFS-based repository with the file's UHI. Bob uses IPFS commands to download the file. Upon receiving the file from IPFS network, Bob decrypts the encrypted AES secret key. Finally, Bob decrypts the download file from IPFS network using the shared AES secret key (KAB). The scenario is illustrated in the Figure-Q5 below. Show the required OpenSSL and IPFS commands sequentially for each step stated above. Please provide screenshot of the outcome for each command.

30_figure3.jpg

 

Attachment:- SECURITY IN COMPUTING AND IT.rar

Reference no: EM132284901

Questions Cloud

Pick one coffee shop–local or national chain : What is the one product or service selected from your chosen company choice? Explain your rationale for this selection.
What are the deficiencies in the present way of doing things : ARTS1301 What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?
Manufacturing firms come from the manufacturing function : Why have relatively few CEO's of American manufacturing firms come from the manufacturing function, as opposed to finance or accounting,
Create an original analytical research report : Contemporary emerging technology-intensive organizations. Explain how to avoid the pitfalls of emerging technology.
Design a secure voting prototype : Security in Computing and Information Technology - Design a secure voting prototype as shown in Figure-Q1 using Paillier cryptosystem where the votes
Identify and assess an intrapreneurial opportunities : Identify and assess an intrapreneurial opportunities within Bank of America and intrapreneurial assessment.
Describe the assessment you used to analyze your skills : Describe the assessment you used to analyze your skills. Describe any additional training you need in specific areas of communication.
Who orders particular part to supply production process : Consider a manufacturer who orders a particular part to supply a production process.
Who were the stakeholders and affected parties : What community standards were relevant to the controversy surrounding the Ford Pinto? Who were the stakeholders and affected parties?

Reviews

len2284901

4/16/2019 2:41:45 AM

Special Instructions: • You are required to submit answers as a PDF or Word Document format by uploading in the CANVAS on or before due date. • You are required to show all of the steps and intermediate results for each of the questions. • Please DO NOT provide ONLY codes as answers.

Write a Review

Other Subject Questions & Answers

  Perform a health history on an older adult

Perform a health history on an older adult. Students who do not work in an acute setting may "practice" these skill with patient, community member and neighbor.

  What decision did the court actually make

What are the facts of the case? What is the constitutional question that the Court must answer?

  Present findings regarding co-occurring disorders

Explore the relationship between women and co-occurring disorders. Specifically, examine the evidence as to whether there is a gender difference.

  Structured and clear or permissive and flexible

Are human beings good, bad, or a combination of both? Give reasons for your answer. Do you feel that living morally is a natural and easy process, or a hard and arduous task?

  Concept of data driven policing

Explain the importance of Data Drive Policing? How can it assist the agency with deployment and other aspects of policing? With one citation.

  Theoretical and conceptual frames of reference

Students and novice researchers often have difficulty in constructing Frame of Reference for their study. This is essential element in research process as it links the study to the wider body of knowledge involved and aids to clarify the concepts ..

  Describe the formal and informal characteristics of training

Describe the formal and/or informal characteristics of the training and Write a SMART goal that would be suitable for the training

  Boomerang generation affect family structures

For example, would you consider, as a result of certain circumstances, moving back in with your parents after finishing your college degree(s)?

  What is the name of the event

Watch the concert and write an essay (minimum length: three-pages, 12-point font, double spaced) that describes your experience. Address the following questions: What is the name of the event? When and where did the concert take place

  The defendant distributed a controlled substance

he defendant distributed a controlled substance. To distribute means to transfer or to attempt to transfer an item to another person.

  Describe classical conditioning

Describe classical conditioning

  Write a software requirements specification

BN209 - Define System requirement through requirement elicitation and workshops - Explain the process for, and execute, verification and validation of system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd