Distribute secret keys to two communicating parties

Assignment Help Computer Engineering
Reference no: EM133424202

Question 1

In class we learned a fundamental set of cryptography systems. For the duration of these questions presume you have access to a small, but trusted source of information (i.e., a public website).

Discuss how you would apply them to the following situations:

1. Someone who has never communicated with you in the past needs to send you a secret message over an insecure channel. How can he create it so that only you can read it?

2. You need to receive orders over an insecure channel from your boss. How can you make sure his message's integrity has been preserved?

Question 2 What is the difference between a message authentication code and a one-way hash function?

Question 3 List possible ways to distribute secret keys to two communicating parties.

Question 4 List four general categories of schemes for the distribution of public keys.

Question 5 What is a public key certificate?

Question 6 Consider a Diffie-Hellman scheme with a common prime q=11, and a primitive root g=2.

(1) Show that 2 is a primitive root of 11.

(2) If user A has public key Ya=9, what is A's private key Xa?

(3) If user B has public key Yb=3, what is the shared secret key K, shared with A?

Question 7 (1) Consider the Davies and Price hash code scheme described in Section 11.4 and assume that DES is used as the encryption algorithm:

Hi = EMi[Hi-1] Å Hi-1

And recall the complementarity property of DES: If Y = DESK(X), then Y' = DESK'(X'). Use this property to show how a message consisting of blocks M1, M2, ..., MN can be altered without altering its hash code.


(2) Show that a similar attack will succeed against the scheme proposed in [MEYE88]:

Hi = EHi-1[Mi] ÅMi

Reference no: EM133424202

Questions Cloud

How neuroscience might influence social change : Explain how neuroscience might influence social change. Then research one question related to cognitive psychology that is interesting.
Summary on the basics and use of storage pools : summary on the basics and use of storage pools in Windows Server 2016 for virtual machines. Detail the benefits and or limitations of its use compared
How costs and revenues should be shared : Management (who should be in control of this business and how?) How costs and revenues should be shared Duration, for how long this business should be
Discuss the general rule is that most lawsuits must be : The general rule is that most lawsuits must be commenced within 2 years of discovering the claim (i.e. when the claimant knew or ought to have known
Distribute secret keys to two communicating parties : What is the difference between a message authentication code and a one-way hash function and List possible ways to distribute secret keys to two communicating
Explain of the importance of critical thinking : Importance of critical thinking and the implications of not questioning information. How you will use critical thinking to develop a Capstone paper.
Was there a binding contract between hoffman and red owl : but because there was no promise supported by consideration, there was no binding contract to give him a franchise. Was there a binding contract between
Discuss at least three ways financial statement fraud : In the case of Workplace's fraudulent scheme, what are the likely costs/prices, associated with financial statement fraud? Identify and critically discuss
Explain theories of impact the physiological functions : What theory of aging explains why the elderly may lose their sense of smell? Are all of these changes inevitable? What can be done to minimize the effects?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd