Explain different vulnerabilities and attack scenarios

Assignment Help Computer Network Security
Reference no: EM131737304

Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission.

1105_figure.jpg

Issuing a Check:

1. Payee (A) will contact the bank requesting the issuance of $ amount check made payable to (B).
2. Bank responds by sending the payee a check receipt CR, where:

CR = RSA( PuA , check )

check = RSA( PuC , token )

token = AES128( KeyBank , amount )

3. Payee (A) receives the check receipt from the bank, extract the check from it and pass it to the receiver (C).

4. The receiver extracts the token from the check and pass it to the bank encrypted with its own private key to collect the money.
From C to Bank: RSA( PrC , token )

Given the following information about A, C, and the Bank:

For A:

Key length: 1024
Public Exponent: 65537 Public modulus [n]:
B5112FD2E82FB505D8C641DFC7087EBEC3971492CE3B5581BFE239AB192B190B443188BA995FB8BE231021A99E B1679EFE6257BC0DAF95552F92D87BB0E0D6BEB79601DFC74020E915A615FF5C5C7662C3ED5E76266EC4A0A030 92CE3B558B3905FD0A6468120091257EF75B0BBFAC5BDBF56FD4496133F640C7078982372117

Public exponent [e]: 010001 Private exponent [d]:
241C2F5B726EC13D4F440AB324306F867FDF4B7D13A005A780AB0F312E2DC82AD508C3E9E2D892316930B865E9
7E1BDA3B854555FDACBCAD667574B3064D70C5F611E7C6AF45BE29BADA7E5F5494DD8DD79C2BFCCFC1F898E20 BCA8F4BE7AB4142A1499E2DB21FE29E9AD29A6CFACED52BFE1DC94CD52EF76F6ACB1BF167DB81

For C:

Key length: 1024
Public Exponent: 65537 Public modulus [n]:
AB39243C0238D017C8179590824AAB0CA69E9815DF41C34E229AAB7C1F285999122CFBA56D67BA707207480696 928B5719296293123F39BE10EDE7CAB748EE52A088BD094773B313B50A17F088CBBBA70B0537761D12E2EE2D80
54B4974C955C9BF2AACD0DAA1081165E6BE52552E2CABFD6A5232A591369CCF812466C01596B

Public exponent [e]: 010001 Private exponent [d]:
45778870E441E2835385E6035C29291E97D70E43097227E7E278380CC2A35F3E903639DE92F59B999559C8EA0B5 AE7376E18F14A5403DCCC7517E08BC932C8A58961376EB1A4ED80EBA15B3877E0BCE1BA0BEDC6FA06C04C6D5E8 75B30898EC045678168EB06BB3344FEAE2F904761B37D3631DA864FA3AC35B25C539E245CA1

For the Bank:

AES128 Key: 670DBA40AB1F3752EF0DC1D0F8FB4958

a. Calculate the messages sent in steps 1 to 4 if A is sending $ amount equals to your NYIT ID to C.

b. Explain two different vulnerabilities and attack scenarios that are applicable to the above design.

c. Propose an enhancement to the above design to make it more secure.

Reference no: EM131737304

Questions Cloud

Why does he have to study both types of law : Why does he have to study both types of law? What is the difference between procedural and substantive law?
Present value of the introduction of the new chip : Quick Computing currently sells 9 million computer chips each year at a price of $11 per chip. It is about to introduce a new chip
What is the market value of the firm : If the required rate of return to equity-holders (after the capital structure change) is now 23.0%, what is the market value of the firm?
How chester report the threat of expropriations of assets : Discuss accounting treatment for Contingencies as a whole. How should Chester report the threat of expropriations of assets
Explain different vulnerabilities and attack scenarios : Calculate the messages sent in steps 1 to 4 if A is sending $ amount equals to your NYIT ID to C and Explain two different vulnerabilities and attack scenarios
How would changes affect current consumption plans : According to legislation as of late 2002, the death tax (estate tax) is supposed to be fully phased out by the year 2010, but then reinstated at a maximum 55%.
What was the most brilliant defense strategy : How does the disposition of this trial make you feel about the American court system? Knowing what you now know about court logistics?
Wisdom of the current political establishment : Aware of these festering concerns and their consequences, voters have exhausted their patient with presumed wisdom of the current political establishment.
Calculate the price of drug store stocks : Suppose the government decided to levy the current 15.3% social security tax on all levels of wages and salaries, not just the first $80,000.

Reviews

len1737304

11/25/2017 2:26:36 AM

Hello I need two different solutions for the attached assignment. pleaselet me know the price for assignment. Please submit your work in PDF format. Please title your file with your name Given the following design for a money transfer protocol which utilizes public key cryptography

Write a Review

Computer Network Security Questions & Answers

  Media technologies affect social and societal issues

Any introduction of a new technology into a society initiates an endless series of effects, especially for those who have and use the technology compared with those who do not or cannot use the technology. Write a 1,400- to 1,750-word paper that a..

  Investigating data theft

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft.

  Why you think information security is important

You are applying for a job as the Chief Information Officer at Nitro Hardware Company. The application requires you to compose a report on why you think information security is important and discuss at least five emerging threats to information se..

  Management issues of computer security

What are the major defensive mechanisms that can be used to stop such attacks-Pick up one mechanism and comment on it - Management issues of computer security

  Design a logical and topographical layout of planned network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.

  Discuss privacy issues as they are related to computers

Discuss privacy issues as they are related to computers / networks / the Internet. What is privacy? Why is it important? Does the law afford any expectations

  Compare and contrast two natural disasters

Describe three factors that help to influence our nation's focus on natural or man-made disasters - what issues have been raised concerning some of the authorities granted to government agencies in the PATRIOT Act? How have those issues been addres..

  Define the information security governance and management

Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.

  Infa 640 cryptology and data protection

Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.

  What are best practices for working effectively

What are best practices for working effectively and efficiently?

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd