Formulate plans for how to approach the immediate issue

Assignment Help Computer Network Security
Reference no: EM13313401

Scenario:  Stella changes banks following her troubles with SHB. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system. She creates a key pair and supplies Fiona, an officer of UST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a floppy disk which she keeps locked in a wall safe at her home. In turn, Fiona gives Stella access to a key server maintained by UST so that she can readily obtain Fiona's current public key {eF, nF} whenever she needs to communicate securely with Fiona.

Things are fine for several months until Stella sends Fiona a message m asking about current interest rates on Certificates of Deposit issued by UST. As shown below, she enciphers the message first, and then signs it:

1476_mod 1.png

A few days later, Stella received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Fiona transferred the money out of Stella's account into an account of her own in a bank on the Caribbean island of Nevis. When reached via long distance in Nevis, Fiona produced a message g from Stella saying: "Thanks for your excellent service, Fiona. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Stella."

Stella files suit against Fiona, UST and the government of the Nevis, claiming that the message was a forgery sent by Fiona herself, asking for triple damages for pain and suffering. Fiona has responded by claiming that all procedures were followed properly and that Stella is filing a nuisance suit.

You have been employed by UST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Stella issue. You obtain Fiona's private key from the UST server, and the cipher text c, and calculate 

1286_mod 2.png

Your report to the UST Board of Directors should address the following issues:

  • From the facts as presented what can be determined about Stella's intentions to make Fiona a gift of $1,000,000?
  • What is the significance of Nevis Island?
  • What is the significance of Stella's message to Fiona asking for interest rates?
  • Assuming UST wishes to continue using RSA as its cryptographic system, what UST and Stella could have done to protect against this controversy arising?

Your report should clearly address these issues including recommendation for the Stella's suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

Reference no: EM13313401

Questions Cloud

What is the velocity of the mass : A spring with a constant of 32N/m is placed on a horizontal smooth surface and a mass of 2.3 kg is pushed against it. What is the velocity of the mass as it leaves contact witht he spring
A manager at winsome manufacturing company : A manager at Winsome Manufacturing Company
Find the fraction of the electrons removed from thus iron : A block of iron 3.00 kg is charged positively with the net charge of .010C. find the fraction of the electrons removed from thus iron
Immune from escalating transportation costs-tipping fees : A waste management strategy that is immune from escalating transportation costs and tipping fees is:
Formulate plans for how to approach the immediate issue : formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.
Right versus right moral dilemma or right versus wrong : Is this an example of right versus right moral dilemma or right versus wrong? Explain your answer either by identifying the two stakeholders and the rights in conflict or by explaining what makes this a right versus wrong situation and the rule..
Calculate the possible velocities of the mother particle : a particle's rest mass is 1.25 M0c^2, decays into two identical paricles of mass .45M0 each. calculate the possible velocities of the mother particle
Designs and fabricates vlsi chips : Assume that you work for a company that designs and fabricates VLSI chips. You have been given the job of selecting a new computer-aided design software package for the engineering group. A. Develop a MAUT model to assist in the selection proces B. D..
Examine the federal tort claims acts : Examine the Federal Tort Claims Acts (FTCA). Discuss whether these laws reduce the risk to citizens or does it serve a compelling state interest. Analyze Dolan v. United States Postal Service.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the single most important new technology

Need a research paper on "What is the single most important new technology that has affected digital forensics in the last five years and why?" The paper has to be well referenced.

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Financial organization managing routine administrative

An organization managing public information on its Web server and a law enforcement organization managing extremely sensitive investigative information.

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  Explain the concepts of information systems security

Explain the concepts of information systems security as applied to an IT infrastructure and describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  Network threats

confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

  Security vulnerabilities of authentication scheme

Clinet's MAC address is explicitly excluded in the AP/router configuration. What are the security vulnerabilities of this authentication scheme?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd