Several cryptography experts

Assignment Help Basic Computer Science
Reference no: EM132716767

While man-in-the-middle attacks are nothing new, several cryptography experts have recently demonstrated a weakness in the popular e-mail encryption program PGP. The experts worked with a graduate student to demonstrate an attack which enables an attacker to decode an encrypted mail message if the victim falls for a simple social-engineering ploy.

The attack would begin with an encrypted message sent by person A intended for person B, but instead the message is intercepted by person C. Person C then launches a chosen cipher text attack by sending a known encrypted message to person B. If person B has his e-mail program set to automatically decrypt the message or decides to decrypt it anyway, he will see only a garbled message. If that person then adds a reply, and includes part of the garbled message, the attacker can then decipher the required key to decrypt the original message from person A.

The attack was tested against two of the more popular PGP implementations, PGP 2.6.2 and GnuPG, and was found to be 100% effective if file compression was not enabled. Both programs have the ability to compress data by default before encrypting it, which can thwart the attack. A paper was published by Bruce Schneier, chief technology officer of Counterpane Internet Security Inc.; Jonathan Katz, an assistant professor of computer science at the University of Maryland; and Kahil Jallad, a graduate student working with Katz at the University of Maryland. It was hoped that the disclosure would prompt changes in the open-source software and commercial versions to enhance its ability to thwart attacks, and to educate users to look for chosen cipher text attacks in general.

PGP is the world?s best known e-mail encryption software and has been a favorite since Phil Zimmermann first invented it in 1991; it has become the most widely used e-mail encryption software. While numerous attacks have been tried, none have yet succeeded in breaking the algorithm. With the power of computers growing exponentially, cracking this or even more modern algorithms is only a matter of time.

1. What can be done to increase the time required to break an encryption algorithm?

2. What is often the trade-off when using more complex algorithms?

3. Phil Zimmermann had to face considerable resistance from the government before being allowed to distribute PGP. What were their concerns, and why did they finally allow its eventual release?

4. Think of other social engineering schemes that might be employed in an effort to intercept encrypted message

Reference no: EM132716767

Questions Cloud

What are the qualifications of a chieftain : What are the qualifications of a chieftain, do you think these qualifications apply to some of the government officials today? Explain further.
Research at least two articles on topic of big data : Research at least two articles on the topic of big data and its business impacts.
What is the direct labor rate variance : If 15,000 units used 61,800 hours at an hourly rate of $19.85 per hour, what is the direct labor (a) rate variance? (b) time variance? (c) cost variance
Understand that sex and gender are different : After watching, do you better understand that sex and gender are different, and that gender is just something socially constructed?
Several cryptography experts : Several cryptography experts have recently demonstrated a weakness in the popular e-mail encryption program PGP
Address issues of social class : Go to the following website and listen to Elna Baker's 16-minute segment of the This American Life podcast entitled, "Babies Buying Babies."
Determine variable factory overhead controllable variance : The actual variable factory overhead was $52,770. Determine the variable factory overhead controllable variance
Determine the fixed factory overhead volume variance : Bellingham Company produced 15,000 units of product that required 4 standard direct labor hours per unit. Determine the fixed factory overhead volume variance
Industry experts believe blockchain is technology : Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Perform the osius-rojek and stukel tests and draw conclusion

Perform the Hosmer-Lemeshow test using 10 groups. State hypotheses, test statistic, p-value, and conclusions. Also, examine the Pearson residuals from the groupings and indicate whether they show any particular pattern.

  Lightweight cryptgraphy to protech small electronics

Lightweight Cryptgraphy to protech small electronics - using Internet of things ( thesis statement : IoT devices are hard to patch )

  Statements and normative statements in economics

1. In a paragraph, distinguish between positive statements and normative statements in economics.

  Managing network security through policies

Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy and give three reasons why you beli..

  Advantages to physical servers

Are there any advantages to physical servers that would preclude someone from usingvirtual machines? At what point do you think the inherent cost savings and manageabilityadvantages that virtual machines provide would outweigh the physical ser..

  Describe a method to perform insertion

A B∗-tree of order M is a B-tree in which each interior node has between 2M/3 and M children. Describe a method to perform insertion into a  B∗-tree.

  Discussion on chain letter-phishing message

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email?

  What is the distance measurement error for this system

Three access points are located at AP1, AP2, and AP3 are located at (0, 0), (50, 0), and (0, 50), and a mobile terminal (MT) is located at (20,10).

  Consider a router that interconnects three subnets

Consider a router that interconnects three subnets

  Write a select statement that columns from the products tab

Write a SELECT statement that returns these columns from the Products table

  Why might jake stay with a company he does not like

He researches some other companies but then decides to stay with the one he's using. Why might Jake stay with a company he does not like?

  Impact of the person in project

Impact Indicators are brief statements that offer perception into your effect. A Coachee will take a primary bypass at drafting their "Made impact by" statement

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd