How does the guessing time change

Assignment Help Computer Network Security
Reference no: EM132253195

Question 1: Research Paper

Read the paper "Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses". Summarize the paper in your own words. making sure to comment on assumptions and evaluation criteria. (a good answer would probably take about two pages)

Question 2: Message Authentication Codes

You (Alice) have agreed a protocol with your bank (Bob) to send them instructions: if you want to send a message m you must also transmit an "authentication tag" which is an additional value that you use to prove that you sent the message. You are trying to work out what the tag should be, and you remember studying "hash functions" and "message authentication codes" when you were in school. You suggest the following scheme:

Alice → Bob : m|| h(m, "Bob")
where h() is a cryptographic hash function and II denotes concatenation.

1. Does this scheme provide the following, for the message m,
(a) confidentiality?
(b) integrity?
(c) authenticity?
Explain why, or why not. (a good answer would probably take at most half a page.)

2. If you share a secret key k with the bank can you think of a better way to compute the tag? Explain your reasoning and check which of the above properties you now have. (a good answer would probably take at most 1 page.)

3. Eve wants to steal some money by sending "Pay Eve 1000" to your bank. Unfortunately, she does not know how to compute your suggested tag, so she just guesses a random value.

(a) If the tag is 32 bits long (and h is a good hash function), what is the probability that Eve guessed right?

(b) Assuming she can send 1000 tags per second to the bank without triggering alarms, deduce how long on average it will take her to guess one that the bank will accept.

(c) How does the guessing time change if the tag is 64 bits long instead?

4. Suppose the bank uses the following procedure to verify the tag:
• Read the tag that was actually sent (as a sequence of bits): tag0 = b0b1.....b31
• Compute what the tag should be: tag1 = b,0b,1....b'31
• If b0 ≠ b'0 , return "tag was incorrect".
• If b1 ≠ b'1, return "tag was incorrect".
• If b31 ≠ b'31, return "tag was incorrect".

If Eve has access to a very accurate stopwatch, can she use this information to guess the tag more quickly than brute force? Can you suggest any improvements to this procedure?

Verified Expert

The task file solved and explained the 2.3 and 2.4 questions related to banking message authentication system. The hash tag functions and its applications are described. the encyrption and deciphering the text is given in detail

Reference no: EM132253195

Questions Cloud

Who might be liable for insider trading : If Jack was to buy the stock in GreenLife Company, based on Susan's advice about the merger, who might be liable for insider trading?
Find system configuration information : Discuss any of the processes used to find system configuration information, fix a network connection, or to configure remote services.
Briefly explain the operation of process costing : Process costing serves two related purposes. First, it measures the cost of goods manufactured on both a total and per-unit basis. This information is used.
Maximum exposure while staying within its client budget : How many times should each of the two media be used in the next financial quarter to obtain maximum exposure while staying within its client’s budget?
How does the guessing time change : what is the probability that Eve guessed right - deduce how long on average it will take her to guess one that the bank will accept
What is the impact of military drone piloting : What is the impact of military drone piloting done by civilians on the other side of the world. How does making combat decisions affect their psyche?
Essay on business ethics and business development : Write an essay on business ethics and business development in The Founder movie on netflix.
How to convert the signed decimal number : How to convert the signed decimal number +135 into a two's complement hexadecimal number?
Write a function named is divisible that takes two parameter : a. Write a function named is Divisible that takes two parameters 1. maxInt, an integer 2. twoInts, a tuple of two integers

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd