Reference no: EM132968003
SENG2250 System and Network Security - The University of Newcastle
Network Security School of Information and Physical Sciences
Aims
This assignment aims to establish a basic familiarity with security primitives and attacks by analysing, demonstrating solutions using cryptography.
Question 1. Block Cipher and Operation Modes
Use an AES encryption calculator to demonstrate the CBC mode with AES (CBC-AES).
a. Create a 128-bit key and a 512-bit plaintext (all in hexadecimal). (5 marks) The key should start with your student ID. For example, if your student ID is C1234567, then your key can be:
C1234567EDEEEFF0F2F3F4F5F7F8F9FA
b. Specify an Initialisation Vector (IV). An IV cannot be a trivial string like all 0s or 1s.
c. Demonstrate the process of each round in the CBC-AES. You can use the AES encryption calculator to show the block cipher encryption result without providing the encryption detail.
d. Show the entire ciphertext of 512 bits.
e. Please use the following format for your answers.
2. Brute-Force Attacks
Suppose that a language "X" has 32 different letters. Answer the following questions.
a. Alice wants to use a 10-letter password (case insensitive). Each password character is randomly selected from 32 possible letters. how many different passwords can be generated?
b. Suppose that an adversary can attempt passwords at a rate of two million per second. If an adversary can immediately know an attempted password's correctness, what is the expected time (i.e., average time) to reveal Alice's password generated above? Convert the time to the number of days.
c. Suppose that Bob uses a monoalphabetic substitution cipher (regarding the language "X") to encrypt a message. Assume the redundancy of the plaintext "X" is 6. how many ciphertext characters are needed to identify a unique key?
3. hash Functions
a. Let h be a secure one-way hash function. Given a set {v!, v", v#, v$, v%}, such that
v! = h(??); v" = h(v!); v# = h(v"); v$ = h(v#); v% = h(v$).
Suppose v# is known, can we compute any of others in {v!, v", v$, v%}? If yes, show how; otherwise, explain why.
b. Suppose ((e, n), d) is an RSA public and private key pair. The public key (e, n) is known to everyone, but NO one knows the private key d. Consider a message space M, for all m ∈ M, we have m < n. Can we use the RSA encryption algorithm as a cryptographic hash function for a message m? Justify your answer. (hint: RSA has a property: (m!m")& = m&m& m??d n)
! "
4. Cryptanalysis on Monoalphabetic Cipher
A monoalphabetic substitution cipher generates the ciphertext below. Perform cryptanalysis and find the plaintext. Note that the plaintext only includes meaningful English sentence(s).
Ciphertext
rm clmhrwvirmt grnv zh gsv ulfigs wrnvmhrlm nliv li ovhh vjfrezovmg gl gsv gsivv hkzgrzo wrnvmhrlmh dv ifm rmgl lmv izgsvi wruurcfog jfvhgrlm.
a. Find the plaintext.
b. Show your process of finding (at least) FIVE plaintext letters.
Attachment:- System and Network Security.rar
What is the expected yield on the loan at year one
: However, the borrower is required to pay 2 discount points. What is the expected yield on this loan at years 1, 5, 10, and 30? What is the APR
|
Calculate the total lease payments
: The Machinery has a useful life of 12 years. There is no purchase option available at the end of the lease term. Calculate the total lease payments
|
Explain break even analysis
: Explain break even analysis and the important role it plays for a business. key points in their response such as the sales dollars (i.e., total revenue)
|
What will be the change in the firm total monthly profits
: If the interest rate is 1.5% per month, what will be the change in the firm's total monthly profits on present value basis if credit is offered to all customers
|
SENG2250 System and Network Security Assignment
: SENG2250 System and Network Security Assignment Help and Solution, The University of Newcastle - Assessment Writing Service
|
Compute the cost of self-constructed investment property
: Other directly attributable costs in the construction - 350,000. Compute the cost of self-constructed investment property
|
Did the pension fund investments have a good year
: Does the CAFR indicate that the government provides other post-employment benefits? If so, what is the nature of these benefits?
|
What the projects internal rate of return
: Lux Company invested in a project that required a $10,000 initial investment. What the projects internal rate of return
|
Does the government report pension liabilities
: Does the CAFR indicate the actuarial value of plan assets and liabilities? Are the plans over-or underfunded? Does the government report pension liabilities?
|