Introduction the area of cyber security

Assignment Help Basic Computer Science
Reference no: EM13934823

Introduction The area of Cyber security is rapidly evolving, with important research being conducted at all levels. The current and potential damage to societies, businesses, and individuals is a topic of growing importance to Governments across the globe. The primary aim of this assignment is that analyse and design a solution to a given problem. Problem Outline Glyndwr Video Ltd, an online video programme seller recently decided to improve the accountability and security of its business services.

To achieve this, the company requires each employee to have a pair of public and secret RSA keys, and to digitally sign any sale agreement with his/her secret RSA key. In case of a dispute about the sale agreement, the company can easily identify the responsible employee and take appropriate action accordingly. The company has many PCs connected to a network. All PCs run the same software and are connected to a central server via the network. Each employee can use any one of the PCs, However the employee does not have a smart card or any secure way of carrying his/her secret key fro PC to PC. Instead each employee stores the secret key on the server. And will use a password to request the server to transfer the secret key to his/her PC. Details You are required to perform the following tasks (make any necessary assumptions) and document all results obtained from each of the tasks. 1. Design a protocol to allow the server to securely store the secret RSA key of each employee without being able to see the key. 2. Propose a protocol for a employee to securely download his/her key from the server. Note that this protocol must ensure that the server transfers a secret key to an employee only when the server is convinced that the employee is the owner of the secret key. Analyse the security of the secret key. 3. If for example a customer wants to secure his/her communications with Glyndwr Video, but the customer can only use a DES crypto system and does not have a shared DES key with Glyndwr Video. Devise a protocol for the customer to securely send a message to Glyndwr Video without any help from a third party. Analyse the security of this protocol

Reference no: EM13934823

Questions Cloud

What will your monthly payment be : You want to buy a new sports car from Muscle Motors for $87,000. The contract is in the form of a 60-month annuity due at a 7.70 percent APR. What will your monthly payment be?
About the product warranties : Product warranties are an interesting liability on a client’s books. When a car company issues a recall for a defective part, management can easily determine the number of units sold and to whom, as well as estimate the parts and labor necessary. Wha..
Strategies used in a health and social care settings : Write a 3000 word essay consisting of three main sections (1,000 words per section) addressing the learning outcomes above. In this assignment students must demonstrate their understanding of communication principles, techniques and strategies..
What is the percentage change in price of bond : Both bond A and bond B have 9.8 percent coupons and are priced at par value. Bond A has 9 years to maturity, while bond B has 20 years to maturity. a. If interest rates suddenly rise by 2.4 percent, what is the percentage change in price of bond A an..
Introduction the area of cyber security : Introduction The area of Cyber security is rapidly evolving, with important research being conducted at all levels. The current and potential damage to societies, businesses, and individuals is a topic of growing importance to Governments across t..
Knowledge development and refined abilities : Effective study skills which focuses upon knowledge development and refined abilities form the sole foundation for the process of learning (Adams et.al, 1994).
Implement a variant of the classic bouncing ball animation : Your task is to implement a variant of the classic bouncing ball animation. To give you an idea of what such an animation could look like we've enclosed a windows executable as part of this assignment.
What must be the forecasted inflation rate in year : Suppose the real risk-free rate currently is 3% and a maturity risk premium of 0.15% per year to maturity applies, i.e., MRP=0.15%*t, where t is the years to maturity. The averaged expected inflation rate over the next following 3 years is 2.5%. If t..
How does dehydration trap so much chemical energy : 2-phosphoglycerate and phosphoenolpyruvate differ only by dehydration between C-2 and C-3, yet the difference in delta G knot prime of hydrolysis is about -50Kj/mol. How does dehydration "trap" so much chemical energy?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Aes uses the indirect-rijndael algorithm

AES uses the Indirect-Rijndael algorithm  2. packet filter protect networks by blocking packets based on the packets' content

  Construct a 3-bit counter using three d flip-flops

Construct a 3-bit counter using three D flip-flops and a selection of gates. The inputs should consist of a signal that resets the counter to 0, called reset, and a signal to increment the counter, called inc.

  What needs to be done to avoid such problem

Based on our class discussion regarding E-R Diagrams, if an attribute is appearing in a number of entity sets does this situation lead to the issue of data redundancy? If yes, what needs to be done to avoid such problem?

  How would you display the man page for shadow

How would you display the man page for shadow in section 5 of the system manual?

  Updated code for the networking program

Please get me the updated code for the networking program also i need an abstract of how the code works, the source file , and all information needed to defend it.

  Evaluate the cost of materials

Evaluate the cost of materials

  You mentioned normalization to cassia

In your discussion of the systems design phase, you mentioned normalization to Cassia. She would like you to explain the basics of normalization in plain English to help her understand the data design tasks.

  Preferred storage method for vsphere

For this discussion, select your preferred storage method for vSphere and explain why this is your preferred method.•Is one storage method easier to configure and support than another? If so, which one do you feel is easier? Explain what separates th..

  Describe a situation where dynamic memory allocation

Describe a situation where dynamic memory allocation might be required in order to make efficient use of your computer's resources. Also describe the precautions that your program should take for the correct and efficient implementation of dynamic..

  Write an algorithm to sort three numbers in ascending order

determine and write an algorithm to sort three numbers in ascending order

  Find commercial web site show bleeding edge technology error

Visit the Internet and discover commercial Web sites which show each of the common errors listed below. Give links to those Websites in Microsoft Word document.

  Research paper tcp/ip protocol hierarchy

Write a 2 page research paper (excluding the title and reference pages) on five-layer TCP/IP protocol hierarchy. Use three other resources (Wikipedia sources are not permitted) and list each resource used at the end of the paper in the reference l..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd