Network security related question

Assignment Help Operating System
Reference no: EM1379596

Question1. Assume we want to use Kerberos for securing electronic mail. The obvious way of accomplishing this is for Alice, when sending a message to Bob, to obtain a ticket for Bob and include that in the email message, and to encrypt and/or integrity-protect the email message using the key in the ticket. The problem with this is that then the KDC would give Alice a quantity encrypted with Bob's password-derived master key, and then Alice could do off-line password guessing. How might Kerberos be extended to secure email without allowing off-line password guessing?
(Hint: Issue human users an extra, unguessable master key for use with mail, and extend the Kerberos protocol to allow Bob to safely obtain his unguessable master key from the KDC.)

Question2. Suppose we are using secret key technology. What is wrong with the following source authentication scheme?
Alice chooses a per-message secret key K, and puts an encrypted version of K in the header for each recipient, (ie Bob and Ted). Next, Alice uses K to compute a MAC on the message, say a DES-CBC residue, or to compute a message digest of K and append it to the message.

(Hint: this works fine for a single recipient, but there is a security problem if Alice sends a multiple-recipient message. Once they receive the message, Bob and Ted know both K and K encrypted with the key they share with Alice. This allows either to forge a message to the other as if it were from Alice.)

 

Reference no: EM1379596

Questions Cloud

Provide examples of famous assignments that have failed : Discuss the examples of famous assignments that have failed because of relatively simple errors?
Mobile computing technology : Discuss similarities and differences of patient vital signs using mobile computing technology to in-patient visits to the doctor's office or hospital.
Regulating the networking field : Describe whether there are too many standards organizations attempting to regulate networking field. Take into consideration whether consultation is necessary to manage standards.
Determine transmission line speed : Imagine you are creating an application at work that transmits data record to another building within the similar city. The data records are 500 bytes in length,
Network security related question : Assume we want to use Kerberos for securing electronic mail. The obvious way of accomplishing this is for Alice, when sending a message to Bob,
Develop and manage internet usage : Discuss how does management in business or education develop and manage Internet usage as it relates to research, supplemental resources and functional support? Explain your answer with examples.
Question about big oh relationship : Provide witnesses n0 and c that can be used to prove the relationship. Select your witnesses to be minimal, in the sense that n0-1 and c are not witnesses, and if d
Frequency definition of bandwidth : In data communication we often use term "bandwidth" when we refer to capacity of a link. Strictly speaking, however, bandwidth refers to range of frequencies that can be carried on a link.
Question about Ethernet capture effect : The teacher went over the following trouble in class. However, I do not understand how he describes the work. He skips too many steps and jumps around.

Reviews

Write a Review

Operating System Questions & Answers

  Objectives of database management systems

Discuss the objectives of database management systems, Integrating databases; sharing information; maintaining integrity; reducing redundancy and enabling database evolution

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  What is the main advantage of multiprogramming

What is the main advantage of multiprogramming How does the distinction between the monitor mode and user mode function as a rudimentary form of protection (security) system What is the difference between a trap and an interrupt? What is the u..

  Difference between a formal and an informal system

Explain the main reasons that firms implement intranets and one major obstacle to obtaining these benefits also explain the difference between a formal and an informal system.

  Write bash shell script for number files in directories

Write a bash shell script filestatic. The script should examine the number files in directories given as arguments (parameters) to this script.

  Change current operating system of plant

The software house has been contacted by a Governmental Nuclear Reactor Agency that wants to change the current Operating System of their plant.

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

  Discussion on operating systems

In recent computer trend sources, it has been discussed that the OS are likely to become more user friendly, voice driven, stable, and even will repair themselves when required.

  Identifying communication techniques

Explain the techniques that will be used to monitor implementation of the electronic medical record.

  Explain how a race condition is possible

the wife calls deposit (). Describe how a race condition is possible and what might be done to prevent the race condition from occurring.

  Benefits and drawbacks of networked computers

Discuss the benefits of networked computers? What are the drawbacks? Describe similar characteristics between the internet and a group of networked computers.

  Give three advantages of virtual machine

In different communications models, communication may take place using either "message passing" or "shared memory". Distinguish between "message passing" and "shared memory", illustrating your answer with a diagram Give three advantages of virt..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd