Design a secure voting prototype

Assignment Help Other Subject
Reference no: EM132284901 , Length: word count:1500

PART-1

Q1. (Privacy-Preserving Computation)

Suppose there are 9 voters to vote for YES or NO to give their opinions.

Design a secure voting prototype as shown in Figure-Q1 using Paillier cryptosystem where the votes must be encrypted from Voting Booth before sending them to the Voting Server.

1409_figure.jpg

Figure-Q1: Secure voting system

Assume, five voters will vote for YES and four voters will vote for NO. The Voting Authority should find five YESs and four NOs after counting the votes. The Voting Authority chooses p=37, q=73 and select g=9868. The private numbers chosen by 9 voters and their votes are as follows:

Voter

No.

Voter's Private Number, r

Vote

Voting message,

m

1

20

YES

00010000 = 16

2

21

YES

00010000 = 16

3

22

YES

00010000 = 16

4

23

YES

00010000 = 16

5

24

YES

00010000 = 16

6

25

NO

00000001 = 1

7

26

NO

00000001 = 1

8

27

NO

00000001 = 1

9

28

NO

00000001 = 1

Show the encryption, homomorphic computations and decryption processes. [Hints: Refer to the lecture-5 Secure e-voting. You need to represent the total number of votes by 8-bit string. The first 4 (four) bits should represent the votes for YES and the rests for NO. When adding a vote for YES, the system adds 00010000, which is 16 in integer. Similarly, the system adds 00000001 when voting for NO, which is 1 in the integer form.]

Q2.

Suppose Bob and Alice, two business partners, use their smart phones to communicate with each other regarding their business decisions. Hence, their messages are very sensitive and require to be authenticated. Otherwise, an attacker, say one of their business rivals, may perform phone number porting fraud attack. In this attack, the attacker may use another SIM card to port Alice or Bob's phone number for pretending as Alice or Bob, respectively. Therefore, BoB and Alice uses digital signature scheme in their smart phone to sign messages for ensuring authenticity. The working procedure of the digital signature is illustrated in FigureQ2.

965_figure1.jpg

Answer Q2.1, Q2.2 and Q2.3 using the scenario mentioned above.

Q2.1

Suppose Bob (the sender) wants to send a message m=654321 to Alice (the receiver). However, before sending the message he would like sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses parameter p = 9973 and q = 7541, and chooses a suitable public key parameter

e=7321. How would Bob sign message m=654321? How would Alice verify the signed message from Bob?
[Hints: Refer to the lecture-6 and tutorial-6. You do not need to generate hash of the message m.]

Q2.2
Suppose Bob (the sender) wants to send a message m=9876 to Alice (the receiver). However, before sending the message he would like sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using ElGamal encryption algorithm and sends the public key to Alice. Bob chooses p=8369, g=3031, x=61. How would Bob sign message m=9876? How would Alice verify the signed message from Bob?

Q2.3
Suppose Bob (the sender) wants to send a large text message M to Alice (the receiver). You should download the text message file "Message.txt" from the CANVAS. The text message M is as follows:

The invention of computers in the 20th century revolutionized cryptology. IBM Corporation created a code, Data Encryption Standard (DES) that has not been broken to this day. Thousands of complex codes and ciphers have been programmed into computers so that computers can algorithmically unscramble secret messages and encrypted files.

Before sending the message, Bob generates a hash h(M) of the text message M using MD5 hash algorithm, and converts h(M) into integer message m. Then, he signs the m and sends it to Alice. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses the following parameters:
p = 330620674058481288123238031776544995151
q = 273416090781657641961913344431645866621

Bob chooses a suitable public key parameter e=37. How would Bob sign message M? How would Alice verify the signed message from Bob?

Q2.4
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.

Q3 (BlockChain Technology)

Write a well-organized report on how the blockchain technology can impact Smart Industry systems. Please consider the followings in your report sequentially:

a) Explain a motivating scenario of a smart industry where the blockchain can be applied.
b) Explain your understanding with necessary diagrams on how the specified
smart industry can be designed using blockchain.
c) Discuss some popular consensus mechanisms for blockchain. Among the popular consensus mechanisms, which one can be applied in your specified blockchain based smart industry and why? Justify your answer.
d) Explain how the integrity and traceability of smart industry data are obtained using blockchain in your specified scenario.
e) What are the advantages and disadvantages of using blockchain technology in your specified smart industry?

Q4 (Authentication Protocol)
The following mutual authentication protocol is proposed based on a symmetric-key cryptography algorithm. We assume that the cryptography algorithm that is used here is secure. Given that the following protocol does not provide mutual authentication. Give two different attack scenarios where Trudy can convince Bob that she is Alice. Briefly explain each attack scenario performed by Trudy with proper diagram which on the protocol.

1088_figure2.jpg

[Hints: You need to show two attack scenarios performed by Trudy with proper diagram on the protocol. Additionally, provide brief explanation of attacks to justify

your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.]

Q5 (OpenSSL and IPFS)

Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KAB) using OpenSSL, uploads the encrypted file in the IPFS-based repository, and receives a Unique Hash Identifier (UHI). Next, Alice encrypts KAB and UHI with Bob's RSA public key using OpenSSL and gets ciphertext C. Further, Alice generates a message digest M using OpenSSL with her RSA private key for the ciphertext C. Finally, Alice sends {M, C} to Bob through email.

Upon receiving them, Bob verifies the message digest M using OpenSSL with Alice's RSA public-key. If the verification fails, Bob discards further steps and informs Alice that the verification has been failed. If the verification is successful, Bob decrypts C using OpenSSL with his RSA private-key. If the decryption is successful, Bob retrieves the shared AES secret key (KAB) and unique hash identifier (UHI) for the file.

Bob downloads the file from IPFS-based repository with the file's UHI. Bob uses IPFS commands to download the file. Upon receiving the file from IPFS network, Bob decrypts the encrypted AES secret key. Finally, Bob decrypts the download file from IPFS network using the shared AES secret key (KAB). The scenario is illustrated in the Figure-Q5 below. Show the required OpenSSL and IPFS commands sequentially for each step stated above. Please provide screenshot of the outcome for each command.

30_figure3.jpg

 

Attachment:- SECURITY IN COMPUTING AND IT.rar

Reference no: EM132284901

Questions Cloud

Pick one coffee shop–local or national chain : What is the one product or service selected from your chosen company choice? Explain your rationale for this selection.
What are the deficiencies in the present way of doing things : ARTS1301 What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?
Manufacturing firms come from the manufacturing function : Why have relatively few CEO's of American manufacturing firms come from the manufacturing function, as opposed to finance or accounting,
Create an original analytical research report : Contemporary emerging technology-intensive organizations. Explain how to avoid the pitfalls of emerging technology.
Design a secure voting prototype : Security in Computing and Information Technology - Design a secure voting prototype as shown in Figure-Q1 using Paillier cryptosystem where the votes
Identify and assess an intrapreneurial opportunities : Identify and assess an intrapreneurial opportunities within Bank of America and intrapreneurial assessment.
Describe the assessment you used to analyze your skills : Describe the assessment you used to analyze your skills. Describe any additional training you need in specific areas of communication.
Who orders particular part to supply production process : Consider a manufacturer who orders a particular part to supply a production process.
Who were the stakeholders and affected parties : What community standards were relevant to the controversy surrounding the Ford Pinto? Who were the stakeholders and affected parties?

Reviews

len2284901

4/16/2019 2:41:45 AM

Special Instructions: • You are required to submit answers as a PDF or Word Document format by uploading in the CANVAS on or before due date. • You are required to show all of the steps and intermediate results for each of the questions. • Please DO NOT provide ONLY codes as answers.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd