Security vulnerability

Assignment Help Computer Engineering
Reference no: EM131689

Question 1. Alice and Bob are sending a message m to each other

a) Give one method to achieve confidentiality for m.

b) Give one method to achieve integrity but NOT confidentiality for m

Question 2. Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw a diagram only to describe the message exchange and the content of each message.

Question 3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Show the entire mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Show the entire mathematical steps)

Question 4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Assume the encryption is absolutely unbreakable.

a) Can B be reasonably sure that the message is generated by A? Why?

b) If B shows another person C that B can use the key k to decrypt the message, can C be reasonably sure that the message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C can be reasonably sure that the message is indeed generated by A?

Question 5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following questions:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If the length of the key is doubled, what is the amount of time required to decrypt the message with brutal force? Why?

Question 6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts the cipher text and retransmits c1-c3-c3-c4, what will be the "plain text" blocks being decrypted into?

Reference no: EM131689

Questions Cloud

Financial accounting system : How can the conventional financial accounting system be made to serve the purpose of operational control
Implement the delivery company : Implement the delivery company using the classes given in the class diagram above.
Write a complete c++ program : The main program will read in a parameter value n (read this in main). Then it will call a function read2arrays (details below) to read lists of grades into two arrays, which the main program will call test1 and test2 (or some other names of your ..
Prepare an arbitrary sinusoidal waveform : Create a program to compute the derivative of an arbitrary input function, with arbitrary duration and arbitrary limits
Security vulnerability : What is the security vulnerability of this solution
Using the irvine32 library functions : Create 32 random points which have (x, y) co-ordinates
Prepare a planning memo for the tlc engagement : Prepare a planning memo for the TLC engagement based on the information provided in the case.
Evaluate the gross profit : Evaluate the gross profit
Overview of the situation/accounting issue : You will be asked to address a accounting failure from AMERICAN INSURANCE GROUP. Overview of the situation/accounting issue

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain interval and arithmetic coding

Evaluate the cumulative distribution function and the binary intervals

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Mathematics in computing

Write the selection sort algorithm

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Data representation and logic

Representing Text and Numbers, Binary Arithmetic, Interpreting Logical Statements, Logic Puzzle, Binary and Algorithms.

  Write a recursive implementation of euclids algorithm

Write a recursive implementation of Euclids algorithm

  Bourne shell and design suitable functions

Bourne shell and design suitable functions

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Convert csv file into html file

Convert CSV file into HTML file

  Security policy document project

Analyze security requirements and develop a security policy

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd