How system derive secret key for des from user-s password

Assignment Help Computer Network Security
Reference no: EM1354897

Q1) Because of known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. In this system the standard UNIX password file is replaced with a publicly readable file /etc/publickey. An entry in the file for user A consists of a user's identifier IDA, the user's public key, PUA, and the corresponding private key PRA. This private key is encrypted using DES with a key derived from the user's login password PA. When A logs in, the system decrypts E[PA, PRA] to obtain PRA.

(a) How might the system derive the secret key for DES from the user's login password PA?

(b) When A logs in, the system verifies that PA was correctly supplied. How?

(c) In terms of password security, does this method offer more, less or the same level of security as the standard UNIX password system? Justify your answer.

Reference no: EM1354897

Questions Cloud

Principles of the psychologists code of conduct : Please help me discuss the major concerns of testing relative to the standards of testing presented by the authors. Explain how these concerns pertain to the general principles of the Psychologists Code of Conduct.
Determine the effective spring constant of the molecule : The jet accelerates uniformly, and during that time, the pendulum oscillates about the equilibrium position shown by the solid line, with D = 0.370 m. find the magnitude of the plane's acceleration.
Organizational structures and design : Identify whether the company has been successful or unsuccessful and explain how the company used its structure and design to achieve its business objectives.
Explain how has bmw achieved continuity of brand message : Explain How has BMW achieved continuity of brand message without alienating existing customers and encouraging new Mini purchasers?
How system derive secret key for des from user-s password : Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..
Adjusting entry-interest receivable : Adjusting Entries: Interest receivable at 1/1/06 was $5,000. During 2006 cash received from debtors for interest on outstanding notes receivable amounted to $6,000.
Explain how can tax cuts help revive the economy : Explain how can tax cuts help revive the economy include discretionary fiscal policy, expansionary fiscal policy, tax multiplier, Aggregate Demand-some-not all--of these and/or other terms from this week.
Exxon organizational performance : "The Outlook for Energy: A view to 2030". This company caused the Valdez oil spill in Prince William Sound, Alaska (1989).
Explain if it is significant you should not try to interpre : Explain If it is significant, you should not try to interpret the main effects at all and Explain why this is the case, giving an example to illustrate your explanation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Cyber weapon

Single Sign On (SSO), Single Sign On (SSO), netstat -an, arp -a, ipconfig /displaydns, MS Config. Means, MS Config. Means, network reconnaissance

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  Explain cross site scripting attack

Explain Cross Site Scripting attack

  Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Thoughts regarding vulnerabilities surrounding computing

What are your thoughts regarding vulnerabilities surrounding the computing world today and the risks of computers being attacked.

  Describing security topology covers four primary areas

Security topology covers four primary areas of concern (design goals, security zones, technologies, and business requirements). Describe each area including key topics in each area. Discuss software threats.

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd