Use the internet to research oauth

Assignment Help Computer Network Security
Reference no: EM132096080

Aim: This assignment is designed to help you improve your critical thinking and problem solving skills, as well as your information literacy skills (i.e. the ability to select and organise information and to communicate it effectively and ethically).

Requirements, Method of Submission, and Marking Criteria:

- Answer all the following questions in a single document. Each question should begin on a new page.

- For each of the first two (2) questions, write a report of approximately 800 words in the structure of a scientific paper.

- Include your name on the first page. Include list of references for each question with proper in-text citations.

- For marking criteria of the first 2 questions, see the included rubric.

- In your answer to question 3 (i.e., cryptanalysis), show all your work. Four (4) marks are assigned to the determination of the correct key-length, four (4) marks to the determination of correct keyword and two (2) marks for determination of the complete plaintext (partial marks count). Upload your solution to the Assignment Box, located in the subject's site.

1. Bring Your Own Device (BYOD) Policy

Use the Internet to locate BYOD Policy from two different organizations. After reading that information, create your own BYOD policy for your school or place of employment. What restrictions should be enforced? What control should the organization have over the personal devices?

Write a short (approximately 800 words) report on your research.

2. Open Authentication (OAuth)

Use the Internet to research OAuth. What is the technology behind it? What are its strength? What are its weaknesses? Will it replace OpenID? Would you recommend it for secure applications like online banking?

Write a short (approximately 800 words) report on your research.

3. Cryptanalysis of Polyalphabetic Ciphers:

In this question you learn a classical polyalphabetic substitution cipher (known as Vigenere cipher), and are required to cryptanalysis a given cryptogram. Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding ciphertext within an appropriate time frame.

Background

Julius Caesar used a cipher which moved each letter of the alphabet to the letter three to the left in the predetermined order of the letters of the alphabet. Figure 1 shows original English alphabet and corresponding cryptogram alphabet in Caesar cipher:

a b c d e f g h i j k l m n o p q r s t u v w x y z
d e f g h i j k l m n o p q r s t u v w x y z a b c

Figure 1: English alphabet letter and their corresponding cryptograms in the Caesar cipher

In order to use mathematical notations, let convert letters of the alphabet to integers. The most natural conversion is to assign to each letter an integer which indicates the position of the letter in the alphabet. That is, assign 0, 1, ... 24, 25 to a, b, ..., y, z, respectively. Using this conversion, Caesar cipher can be expressed as:

C = Ek(M) = M + 3 (mod 26)

where `C' is the cryptogram, `E' is the encryption algorithm, `k' is the key, `M' is the message/plaintext (one may replace integer 3 by letter `d').

Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the original alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are 26 possible keys/shift.

Vigenere Cipher

In Vigenere cipher the key is more than one letter. That is, Vigenere cipher can be considered as a combination of n shift ciphers, where n is the key-length (i.e., the number of letters in the keyword). Let the message/plaintext be `individual character' and the keyword is `host'. Vigenere cipher encrypts the message as follows:

Plaintext i n d i v i d
Keyword h o s t h o s
Cryptogram p b v b c w v

u a l c h a r a c t e r

t h o s t h o s t h o s

n h z u a h f s v a s j

That is, the first four letters of cryptogram computed as:
‘I' + ‘h' = 8 + 7 = 15 (mod 26) i.e., p
‘n' + ‘o' = 13 + 14 = 1 (mod 26) i.e., b
‘d' + ‘s' = 3 + 18 = 21 (mod 26) i.e., v
‘I' + ‘t' = 8 + 19 = 1 (mod 26) i.e., b

Since the plaintext is longer than the keyword, keyword is repeated till all letters of the plaintext are encrypted. As it can be seen, a particular letter of the plaintext may be encrypted with different letters from the keyword. For example, the first occurrence of letter ‘I' from the plaintext is encrypted with `h', where its second and third occurrences are encrypted with letters ‘t', and ‘o' respectively. That is, Vigenere cipher is a polyalphabetic substitution cipher.

To break a polyalphabetic substitution cipher, the cryptanalyst must first determine the period (i.e., the key-length) of the cipher. This can be done using two main tools: the Kassiski method, and the index of coincidence. Here we explain Kassiski method, you may search the Internet for the index of coincidence method.

The Kassiski method uses repetitions in the ciphertext to give clues to the cryptanalyst about the period. For example, suppose the plaintext `to be or not to be' has been enciphered using the key `now', producing the ciphertext below:

Plaintext t o b e o r n o
Keyword n o w n o w n o
Cryptogram g c x r c n a c

t t o b e

w n o w n

p g c x r

In the given cryptogram (i.e., g c x r c n a c p g c x r) contains the pattern g c x r which is repeated and the distance of repetition is 9. This could be the sign in which the same letters from plaintext is encrypted with the same letters from the keyword. Since in Vigenere cipher the keyword is repeated, the key-length is probably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Assuming that the key length is 3, we split the cryptogram into three cryptogram. That is, the 1st, 4th, 7th, ...

characters of the cryptogram are the result of the shift of the 1st, 4th, 7th, ... characters of the plaintext where the shift is the first letter of the keyword. Similarly, the 2nd, 5th, 8th, ... letters build another list. That is, this Vigenere cipher is a combination of 3 Caesar cipher.

Your Task:

In the following you can find a cryptogram, that are created by Vigenere cipher, where the plaintext is English text and the keyword is meaningful English word. You are required to decipher the cryptogram that matches with your Student-ID.

Attachment:- Advanced E securities.rar

Verified Expert

The solution file is prepared in ms word which discuss about the technology used in the OAuth, strength and weakness of OAuth, OAuth replace with open ID and application of OAuth. The report has cipher text to plain text using Poly alphabetic Ciphers e. The solution has 2100 words and references are included as per APA format.

Reference no: EM132096080

Questions Cloud

Write two programs that tracks an investment : Write two programs that tracks an investment for 1 person based on the input of an interest rate.
Why gateways are used during mail transfer : Why gateways are used during mail transfer?
When jameel compiles his program : When Jameel compiles his program, the compiler return a syntax error on the above statement. Why?
Encode the decoded sequence using the same initial : Encode the decoded sequence using the same initial dictionary. Does your answer match the sequence given above.
Use the internet to research oauth : CP5603 - Advanced E-Security - improve your critical thinking and problem solving skills, as well as your information literacy skills
Efficient way of estimating the test error : Suggest a more computationally efficient way of estimating the test error.
Determine what box weight is exceeded : Determine the probability that the box weight is greater than 104 oz. Determine the probability that the box weight is less than 100 oz.
Polynomial regression : A research ?ts a polynomial regression to his data, but ?nds that the prediction on the edges of his dataset are wildly inaccurate.
Compare symmetric and asymmetric encryption schemes : Compare symmetric and asymmetric encryption schemes, and discuss the circumstances under which you would use each.

Reviews

len2096080

8/25/2018 5:45:43 AM

- Excellent progression of - Satisfactory progression - Unsatisfactory topics of topics progression of topics Readability - A highly conventional - A largely conventional - Unclear explanation academic writing style, academic writing style, for all concepts 25% including the use of including the use of appropriate terminology appropriate terminology and unbiased language and unbiased language - Adheres to - Mostly adheres to - No referencing or very IEEE/APA/Harvard IEEE/APA/Harvard limited use of referencing conventions in referencing conventions in references Referencing in-text citation, in-text citation, 10% presentation of presentation of tables/figures and tables/figures and reference list, with next- reference list, with some to-no errors errors

len2096080

8/25/2018 5:45:33 AM

- Identifies, explains and Exhibits - Identifies and explains Exhibits - Demonstrates little prioritises key issues in a key issues in a routine IT mastery of the material complex IT related aspects of related situations. aspects of in the topic area, and situations, drawing upon exemplary - Demonstrates moderate satisfactory shows no ability to relevant theory and real or (left) and mastery of the material in (left) and synthesise and abstract Content hypothetical examples. satisfactory the topic area, and shows very limited knowledge - Demonstrates clear (right) moderate ability to (right) 35% mastery of the material in synthesise and abstract the topic area, and shows knowledge excellent ability to synthesise and abstract knowledge

len2096080

8/25/2018 5:45:24 AM

- Highly appropriate - Largely appropriate - Inappropriate structure structure and professional structure and format, and format, according to format, according to the according to the the genre/text type and Structure genre/text type and task genre/text type and task task requirements, with requirements, including requirements, including no/limited attention to 15% clear attention to word attention to word length word length limit, and length limit, and effective limit, and use of sections, use of sections, use of sections, paragraphs and/or links paragraphs and/or links paragraphs and/or links

len2096080

8/25/2018 5:45:19 AM

In the third question mention the procedure of how you found the keyword, what is the keyword CP5603 Assignment Rubric Criteria Exemplary Good Satisfactory Limited Very Limited (9, 10) (7, 8) (5, 6) (2, 3, 4) (0, 1) - Informative and - Too long or too short - Too long or too short summative in an excellent - Partially informative or - Hardly informative or Title way summative summative - contains most keywords - Partially intriguing and - Contains no keyword 5% - Intriguing and thought- thought-provoking - Hardly intriguing and provoking in an thought-provoking excellent way - Excellent summary of - Satisfactory summary of - No or very limited Abstract contents containing contents containing some abstract 10% problem statement, of problem statement, approach, and result approach, and result

Write a Review

Computer Network Security Questions & Answers

  Prepare a paper on new approaches in cryptography

Prepare a paper on new approaches in cryptography - Cryptography of the Modern Era - This a 6-pages research paper, cite your sources and use apa citation

  Draw a diagram illustrating the network

COIT20262 - Advanced Network Security Assignment. Objective: be able to design packet filtering firewall rules and identify advantages/disadvantages

  Protect the system from these procedural attacks

Summarise the procedures and tools hackers use for information gathering, target systems scanning, back-door opening and log-file clean-up. Alternatively, give an account of a hacker story from a technical perspective, including the tools employed..

  Why is it attractive to a laptop user to have wlan access

Why is it attractive to a laptop user to have WLAN access? Why is it attractive for a laptop user to have cellular data access? Why is it good for carriers?

  Compare and contrast frequency spectrum and bandwidth

How is information sent across a transmission medium from the physical layer? Compare and contrast frequency spectrum and bandwidth.

  What are the five http response code categories

What is the structure of a POST request? What headers have to be present in HTTP/1.0 and HTTP /1.1? What are the five HTTP response code categories? What data are contained in HTTP headers?

  Why would the company wish to remain anonymous

what implementing your solution will do for the organization; this should be a preliminary report that will evolve as the weeks progress

  Design a logical topographical layout of current network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  List some examples of injection attacks

Define an injection attack. List some examples of injection attacks. What are the general circumstances in which injection attacks are found?

  What are advantages and disadvantages of using such a tool

What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely.

  Give a description of the certification or degree program

Describe how often you need to re-certify, and describe if there are any CEUs you must complete after testing for your certification.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd