Implement the secure communication tool

Assignment Help Computer Network Security
Reference no: EM132373388

Network and Information Security

Scenario:

Alice and Bob are two data scientists based in two countries. They are working on sensitive government data sets to track terrorist activities. They do not want to use existing chat applications or email services to share their data sets and analysis reports. Instead of the existing solutions, they want to implement a secure communication tool to share their contents.

Task 1: Using your expert knowledge in encryption\decryption algorithms, suggest a framework for them to achieve their goal.

i. Using a diagram Illustrate how they could implement the secure communication tool. You should consider the prevailing secure key exchange and symmetric encryption methods when designing this tool.
(3 Marks)

ii. Discuss the challenges that would be encountered in key exchange process. Suggest methods to overcome challenges in such environments by employing a Certificate Authority (CA)

Task 2: To demonstrate the practical implementation of the public\private encryption, you have been asked to compete the following task.

i. Type the following message in a .txt file:
"My student ID is : <<Your Student ID>>"
ii. Download the public key given in this assignment folder and encrypt your message with the same key using openssl.
iii. Using openssl, generate RSA key pair (2048bits) in your computer.

Attachment:- Network and Information Security.rar

Reference no: EM132373388

Questions Cloud

How is cash flow affected by the throughput : In The Goal, how is cash flow affected by the throughput, inventory, and customer response time?
Draw an isocost curve showing the different combinations : Draw an isocost curve showing the different combinations of gas and coal that can be purchased with an initial expenditure of E=18,000.
Consider this transformation to be incremental or radical : Would you consider this transformation to be incremental or radical? Why? How does My developerWorks leverage changes in the way people work?
Draw a budget line showing all the different combinations : (A) Draw a budget line showing all the different combinations of the two goods that can be bought with the given budget.
Implement the secure communication tool : ITNE2002 - Network and Information Security - Victorian Institute of Technology (VIC) - Discuss the challenges that would be encountered in key exchange
How business process as service reduces risk : How business process as a service (BPaaS) reduces risk for commercial enterprises.
Increase or decrease the demand for computers : A decrease in the price of Internet service providers will increase or decrease the demand for computers?
Very old man with enormous wings : Analyze and respond to Gabriel Garcia Marquez's "A Very Old Man with Enormous Wings." Why are the townspeople more interested in the Spider Woman than the angel
How can auditors cultivate an appropriate level of scepticis : BUACC3741-Auditing-Federation Business School-Australia-How can auditors cultivate an appropriate level of scepticism in order to do their jobs properly?

Reviews

len2373388

9/20/2019 2:41:30 AM

Submission: 1. Write down your answers for the Task 1 in a MS word file. The file should include a cover page for this assignment with your name, ID and lecturer’s name. 2. Include your .txt file and your public key in a folder named “Task 2” 3. Create a folder with your student ID and include your MS word file and “Task 2” folder in the folder. Compress the folder and create .zip or .rar file 4. Submit the compressed folder in the Moodle for Assignment 1

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd