How the operations work to ensure different aspects

Assignment Help Computer Engineering
Reference no: EM131988103

Assignment

Modes that Combine Encryption and Authentication

I need to have a research paper about one of AES, OCB, CCM or GCM block cipher modes which are some of operation designed to achieve both message privacy and authentication, by merging the features of a MAC directly into the mode.

Structure and Content: The paper should include the following components, organized in a logical flow and written as cohesive paragraphs:

1. Find one mode of operation that is designed to achieve both message privacy and authentication. Give an overview of the mode with details including its authors, date of publication, and what problems it was designed to solve. Also, try to find and cite one or more application protocols or cryptographic libraries in which the chosen mode has been implemented.

2. Describe in detail how the mode works. Do not just paste formulas in your paper; rather, give a high-level, readable English description of the operations of the mode. One good approach here is to use our hypothetical communicators, Alice and Bob, going through the procedures of message construction, transmission, decryption, and validation for one complete authenticated message. Supplement the description with your own intuitions and analysis of how these operations work to ensure different aspects of secure communication. You don't need to use a lot of math in this portion; rather, strive to present as clearly as possible an intuitive understanding of the protocol.

3. Compare and contrast the security and efficiency of your chosen mode with ECB for combining encryption and authentication, and with other modes. You can mention any known weaknesses of the scheme you find in the literature, with proper citations. Citations. All facts and claims presented should be backed up by citations to appropriate references. Wikipedia articles, news articles on technology websites, and blog postings are not appropriate sources to cite for this paper. You are welcome to use Wikipedia to find pointers to the original sources and to aid your own understanding; however, your paper must be based on the original published research. The paper should be formatted in either IEEE or APA reference styles.

Encyption and Authintication (computer science).

Reference no: EM131988103

Questions Cloud

What type of opinion should be issued on financial statement : For each of the independent situations presented above, state what type of opinion should be issued on the company's financial statements
People advocate for trade restrictions : Please help with answering and understanding the question: Under what conditions do people advocate for TRADE RESTRICTIONS?
What is the length of a wimax connection id : What is the length of a WiMAX connection ID? What are three examples of last mile connections? What is the maximum speed of WiMAX in the 10-66 GHz bands?
Developing a tender request as the principal for a project : PPMP20013 - Project Management for Operators of Large Assets - developing a tender request as the principal for a project in the mining, plant
How the operations work to ensure different aspects : Supplement the description with your own intuitions and analysis of how these operations work to ensure different aspects of secure communication.
Play against schools that the ncaa does not certify : The National Collegiate Athletic Association (NCAA) does not allow its members to play against schools that the NCAA does not certify
Describe the circular flow model of the free-market system : 1. Describe the circular flow model of the free-market system. 2. How do consumers use cost-benefit analysis? Why do consumers make different decisions
Prepare the stockholders equity section of the balance sheet : Mar 1 Issued 2,000 share of $50 par preferred stock for $58 per share. Prepare the stockholders' equity section of the balance sheet at December 31, 2012
Result in a less efficient economy : Why might programs redistribute income result in a less efficient economy?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd