Implement the secure communication tool

Assignment Help Computer Network Security
Reference no: EM132373388

Network and Information Security

Scenario:

Alice and Bob are two data scientists based in two countries. They are working on sensitive government data sets to track terrorist activities. They do not want to use existing chat applications or email services to share their data sets and analysis reports. Instead of the existing solutions, they want to implement a secure communication tool to share their contents.

Task 1: Using your expert knowledge in encryption\decryption algorithms, suggest a framework for them to achieve their goal.

i. Using a diagram Illustrate how they could implement the secure communication tool. You should consider the prevailing secure key exchange and symmetric encryption methods when designing this tool.
(3 Marks)

ii. Discuss the challenges that would be encountered in key exchange process. Suggest methods to overcome challenges in such environments by employing a Certificate Authority (CA)

Task 2: To demonstrate the practical implementation of the public\private encryption, you have been asked to compete the following task.

i. Type the following message in a .txt file:
"My student ID is : <<Your Student ID>>"
ii. Download the public key given in this assignment folder and encrypt your message with the same key using openssl.
iii. Using openssl, generate RSA key pair (2048bits) in your computer.

Attachment:- Network and Information Security.rar

Reference no: EM132373388

Questions Cloud

How is cash flow affected by the throughput : In The Goal, how is cash flow affected by the throughput, inventory, and customer response time?
Draw an isocost curve showing the different combinations : Draw an isocost curve showing the different combinations of gas and coal that can be purchased with an initial expenditure of E=18,000.
Consider this transformation to be incremental or radical : Would you consider this transformation to be incremental or radical? Why? How does My developerWorks leverage changes in the way people work?
Draw a budget line showing all the different combinations : (A) Draw a budget line showing all the different combinations of the two goods that can be bought with the given budget.
Implement the secure communication tool : ITNE2002 - Network and Information Security - Victorian Institute of Technology (VIC) - Discuss the challenges that would be encountered in key exchange
How business process as service reduces risk : How business process as a service (BPaaS) reduces risk for commercial enterprises.
Increase or decrease the demand for computers : A decrease in the price of Internet service providers will increase or decrease the demand for computers?
Very old man with enormous wings : Analyze and respond to Gabriel Garcia Marquez's "A Very Old Man with Enormous Wings." Why are the townspeople more interested in the Spider Woman than the angel
How can auditors cultivate an appropriate level of scepticis : BUACC3741-Auditing-Federation Business School-Australia-How can auditors cultivate an appropriate level of scepticism in order to do their jobs properly?

Reviews

len2373388

9/20/2019 2:41:30 AM

Submission: 1. Write down your answers for the Task 1 in a MS word file. The file should include a cover page for this assignment with your name, ID and lecturer’s name. 2. Include your .txt file and your public key in a folder named “Task 2” 3. Create a folder with your student ID and include your MS word file and “Task 2” folder in the folder. Compress the folder and create .zip or .rar file 4. Submit the compressed folder in the Moodle for Assignment 1

Write a Review

Computer Network Security Questions & Answers

  Nap to reduce security risks

You discover that many of your company's customers have been responsible for introducing viruses and malware into the company network via the Internet

  What is the history of des and why is s-des studied

What is the history of DES, and why is s-DES studied? How does DES and 3DES work? Provide an example of each

  Explain how to make the file transfer process more secure

Explain how your layered design compensates for possible device failures or breaches in network security. Determine whether any possible bottlenecks exist in your design. Explain how to make the file transfer process more secure.

  Write the word statistic without the repeated letters

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters. In this case, the message HELLO becomes ECJJM.

  Provide a disaster recovery plan to prevent a small company

Provide a short Disaster Recovery Plan (DRP) to prevent a small company's IT operation. Make a list of procedures to complete in preparation of the DRP. You may use fictitious examples to support your arguments.

  What role does this play in international competitiveness

Can political risk be "managed"? If so, what methods can be used to manage such risk, and how effective are they? Discuss the lengths to which you would go to manage political risk relative to the kinds of returns you would expect to gain.

  Describe how bob can recover the message

FIT3031 - Information & Network Security - Is it possible to perform encryption operations in parallel on multiple blocks of plaintext in CBC mode and describe how Bob can recover the message m from (v || c) using k.

  Create class to maintain personal budget for a year

Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.

  Define a secure system in the blp model

How would you define a secure system in the BLP model - A Security Policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Develop a security plan and recommendation memo to the cio

Develop a Security Plan and Recommendation Memo to the CIO

  Develop potential controls that the company could use

For each of the three or more malicious attacks and / or threats identified in Assignment 1, develop potential controls that the company could use to mitigate each associated risk.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd