Distribute secret keys to two communicating parties

Assignment Help Computer Engineering
Reference no: EM133424202

Question 1

In class we learned a fundamental set of cryptography systems. For the duration of these questions presume you have access to a small, but trusted source of information (i.e., a public website).

Discuss how you would apply them to the following situations:

1. Someone who has never communicated with you in the past needs to send you a secret message over an insecure channel. How can he create it so that only you can read it?

2. You need to receive orders over an insecure channel from your boss. How can you make sure his message's integrity has been preserved?

Question 2 What is the difference between a message authentication code and a one-way hash function?

Question 3 List possible ways to distribute secret keys to two communicating parties.

Question 4 List four general categories of schemes for the distribution of public keys.

Question 5 What is a public key certificate?

Question 6 Consider a Diffie-Hellman scheme with a common prime q=11, and a primitive root g=2.

(1) Show that 2 is a primitive root of 11.

(2) If user A has public key Ya=9, what is A's private key Xa?

(3) If user B has public key Yb=3, what is the shared secret key K, shared with A?

Question 7 (1) Consider the Davies and Price hash code scheme described in Section 11.4 and assume that DES is used as the encryption algorithm:

Hi = EMi[Hi-1] Å Hi-1

And recall the complementarity property of DES: If Y = DESK(X), then Y' = DESK'(X'). Use this property to show how a message consisting of blocks M1, M2, ..., MN can be altered without altering its hash code.


(2) Show that a similar attack will succeed against the scheme proposed in [MEYE88]:

Hi = EHi-1[Mi] ÅMi

Reference no: EM133424202

Questions Cloud

How neuroscience might influence social change : Explain how neuroscience might influence social change. Then research one question related to cognitive psychology that is interesting.
Summary on the basics and use of storage pools : summary on the basics and use of storage pools in Windows Server 2016 for virtual machines. Detail the benefits and or limitations of its use compared
How costs and revenues should be shared : Management (who should be in control of this business and how?) How costs and revenues should be shared Duration, for how long this business should be
Discuss the general rule is that most lawsuits must be : The general rule is that most lawsuits must be commenced within 2 years of discovering the claim (i.e. when the claimant knew or ought to have known
Distribute secret keys to two communicating parties : What is the difference between a message authentication code and a one-way hash function and List possible ways to distribute secret keys to two communicating
Explain of the importance of critical thinking : Importance of critical thinking and the implications of not questioning information. How you will use critical thinking to develop a Capstone paper.
Was there a binding contract between hoffman and red owl : but because there was no promise supported by consideration, there was no binding contract to give him a franchise. Was there a binding contract between
Discuss at least three ways financial statement fraud : In the case of Workplace's fraudulent scheme, what are the likely costs/prices, associated with financial statement fraud? Identify and critically discuss
Explain theories of impact the physiological functions : What theory of aging explains why the elderly may lose their sense of smell? Are all of these changes inevitable? What can be done to minimize the effects?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program to handle student data in an input file

Write a program to handle student data in an input file. Each line in the file represents information for one student.

  Construct an instance of somesuper with parms

Write the Begin method. Construct an instance of SomeSuper with parms of your choosing

  Describe fundamental assets of organisations

Describe different phases of the lifecycle. Why do we need to have this so many phases and Describe fundamental assets of organisations

  How are authentication and authorization alike

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?

  Write an essay on the data visualization

The objective of project annotation is to help others to understand what the project is, what it is about and how to use it. Some experts in data visualization.

  Present overview of the problem that the project addressed

IT 420 Security Considerations in the Information System Development Life Cycle Assignment - Southern New Hampshire University

  Program on inline internal procedures deposit and withdraw

Program on Inline internal procedures deposit and withdraw.

  What is index function for two-dimensional rectangular table

What is the index function for a two-dimensional rectangular table whose rows are indexed from 0 to m - 1 and whose columns are indexed from 0 ot n - 1.

  Explain type of evidence first responders should be looking

Explain what sort of decontamination procedures and equipment will be necessary to treat victims. Identify the appropriate decontamination stage for the attack, and explain initial decontamination considerations. Explain the type of evidence first re..

  What happens in a virtual circuit packet-switched network

What happens in a virtual circuit packet-switched network if a node or communications link along the virtual path fails?

  What peeked your interest the most

Your discussion subject of this week is what did you find most complex or perplexing about vulnerability assessment? What peeked your interest the most?

  Briefly define the fundamental security design principles

List and briefly define the fundamental security design principles. Explain the difference between an attack surface and an attack tree.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd