What are the ways used to distribute public key

Assignment Help Other Subject
Reference no: EM133306456

Part A This part consists of six questions. Answer all questions.

Question 1
a) An attacker compromised a system of internal network from a remote place. Then, the compromised system has been used to redirect all packets destined to a web server. Identify the type of attacks launched by the attacker. Explain the attack scenario with figure.

b) The following text is the output of CAESAR cipher: Wigyvmxc. Find out the key and the corresponding plaintext.

Question 2
Suppose, you are the administrator of an information system where every registered user can access the public keys of any other users. Alice and Bob are registered users of the system. Now, as part of a business process, Alice wants to send sensitive data to Bob using a symmetric-key encryption scheme. However, Alice and Bob do not share any secret key currently. They do not have any secure physical channel which can be used to exchange secret keys safely without encryption. Given the constraints, is it possible for Alice and Bob to exchange sensitive data using a symmetric-key encryption? If possible, explain how.

b) What are the four ways used to distribute public key?

Question 3
a) Suppose, a network consists of four different nodes (A, B, C and D). How many keys do they have to generate such that A, B and C can communicate with D in a bidirectional secure way using the DES algorithm? How many keys do they have to generate such that every pair of nodes can communicate in a bidirectional secure way using the same algorithm? How many keys do they need to generate for both scenarios while using 3DES algorithm?

b) Symmetric encryptions (e.g., AES) can provide data confidentiality like public-key algorithms. What are the two issues that can mainly be addressed by public-key cryptography? Justify your answer in brief.

Question 4
a) Suppose, an LFSR has the following feedback polynomial function: 1 + X2 + X3. Draw the LFSR and also find the bit stream period to determine whether the function is a primitive polynomial.

b) What are the different ways to identify abnormal network behaviour? List at least four of them.

Question 5
a) Compare and contrast with figures between application-level gateway and circuit-level gateway firewalls.

b) What are the two ways to protect password files?

Question 6
a) The following table shows a couple of encryption algorithms and their key sizes employed by TLS and WTLS:

      Algorithm

TLS Key Size (bits)

WTLS Key Size (bits)

          3DES

         168

            40

          IDEA

         128

         40 or 56

Explain why in these cases for the same algorithms WTLS uses shorter keys.

b) Consider a commercial information system which supports data transmission between peer users and between servers and users on the Internet. The system administration team is concerned on data integrity in their servers. Name an access control model, which can be used to protect data integrity. Explain how the model works.

c) How does the recipient in PGP identify the public key of sender?

Part B
This part consists of twoquestions. Answer all questions.

Question 1

a) Consider an application based on wireless communications, which requires a session key of length 15 (that is, 15 bits). For the key to be robust against any brute-force attack, it is required that the session key does not contain any repeating patterns. The following is a linear feedback shift register (LFSR)of length 4. Answer the following questions:

127_Wireless communications.jpg

 

Given the initial bits x1=1, x2=1, x3=0, and x4=1,can a session key that meets the above security requirement be produced by this LFSR? If so, write the first 15 bits of the output stream of the above LFSR. If not, find the period of the output stream.

b) Write a program in shell script that will take an integer value from the useras input and check whether the number is odd or even. The program should continue forn times. See below the sample input and output of the program.

How many times you want to enter the number? 3
Number 1: 10
It is an even number!
Number 2: 7
It is an odd number!
Number 3: 0
Please enter a number greater than 0.

Question 2

a) Suppose the alphabet for creating passwords consists of 10 characters. Without loss of generality, we denote it as A = (a1, a2,a3,a4,a5,a6,a7,a8,a9,a10). Suppose each password must contain 8 characters. How many potential passwords do we have?

b) Suppose among all potential passwords, 1% of them can be viewed as "bad passwords". Given a password, to check whether or not it is a good password, we can compare it with all the "bad passwords" one-by-one. Using this procedure, how many comparisons do we have to operate in the worst case?

c) Given the dictionary of "bad passwords", which is denoted as D, consisting of all the "bad passwords", suppose the matrix of transition probability of a Markov model is given as

116_matrix.jpg

 

where the entry at row i and column j in the above matrix, T(i, j), represents the probability that the character ai is followed by aj in the dictionary, that is, the frequency of the occurrence of the bigram aiaj in the dictionary of "bad passwords". Now, you are given a password, a1a2a4a1a10a5a3a1. Is this a good password? Explain.

d) The Hamming distance between two points, (x1, x2, K, xn) and (y1, y2, K, yn), is defined as:

dH(x1, x2,,.....xn),(y1,y2,......yn))=#{i; xi≠yi}

that is, the number of coordinates where (x1, x2, K, xn)and(y1, y2, K, yn)differ. Given the following data items which are points in the 4-dimensional space, for each pair of data items, calculate the Hamming distance between them:

(1,0,1,0), (1,1,1,0), (1,0,0,0), (0,1,0,1)

Which data point is the most distant one from other data points with respect to the Hamming distance?

Reference no: EM133306456

Questions Cloud

Calculation of net passive income : Which of the following items of income, gain, loss, or deduction will be included in the calculation of net passive income?
What a company can gain by pursuing financial and social : What a company can gain by pursuing financial/competitiveness objectives and social objectives (CSR) together and what capabilities it must have in order
Explain the strength of ties to home concept using : Explain the 'strength of ties to home' concept using, as an example, the integration of qualified immigrants (QIs) into an international workforce.
What trainer will do before training session to facilitate : Exactly which methods/techniques you are using at each step of the training session and why you are using each method/technique at this point?
What are the ways used to distribute public key : What are the four ways used to distribute public key and What are the two issues that can mainly be addressed by public-key cryptography? Justify your answer
Evaluate whether stu will need to use a convergent approach : Evaluate whether STU will need to use a convergent or divergent approach to one of the following HR practices: Recruitment and Selection, Diversity
What are implications of content for you as a student at llu : Do you agree with this statement? What are the implications of the content for you as a student at LLU? Do you have recommendations for how to address the issue
Audit committee report and auditors report : Discuss the difference between the Audit Committee Report and Auditors Report. What is the basic information discussed in these two reports?
Discuss how the protagonist expectations are similar : Discuss how the protagonist's expectations are similar to what has come to be known as the American Dream - the assumption that ambition, hard work

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss about the scientific study of the development

After consulting one of the articles given above, describe how the scientific study of the development of these particular individuals can further our knowledge

  Effective in directing the transition team

Your task with the consultant group is to determine what style of leadership will be the most effective in directing the transition team? Why?

  Describe a collection of specific behaviors

Styles Leadership Theory describes a collection of specific behaviors that can be categorized into autocratic, democratic, or laissez-faire leadership styles.

  Prepare a label for each of your selected artworks

Select at least six to eight artworks total for your exhibition. Prepare a 175- to 250-word label for each of your selected artworks.

  Develop a thesis pertaining to the assigned film text

Develop a thesis pertaining to the assigned film text and whether or not it, the film, in your view has the power to transform one's political sensibilities. Your argument should express your point of view regarding the politics of difference, pol..

  How is given related to intrinsic human value and dignity

What is the Christian view of the nature of human persons, and which theory of moral status is it compatible with? How is this related to the intrinsic human.

  Are oppressing students by asking to use computer interfaces

Are we oppressing students by asking them to use computer interfaces? Are we oppressing students by NOT asking them to use computer interfaces?

  What characteristics would lead a provider to suspect

What characteristics would lead a provider to suspect domestic violence, child abuse, or elder abuse is taking place within a family?

  Disscuss the characteristics and consequences of imperialism

Disscuss the characteristics and consequences of imperialism in the late 1800s and early 1900s. in your essay explain the various motives for imperialism and provide an example of each.

  Discuss health care articles that use quantitative research

Search the GCU Library and find two new health care articles that use quantitative research. Do not use articles from a previous assignment, or articles that.

  Features of congresses and political landscapes

What were some of the distinguishing features of the Congresses and political landscapes in the 1965, 1981, 1993, and 2009 time periods? How did these features enable, impede, or influence health policy developments?

  Describe a recent health care policy

Describe a recent health care policy and discuss it's implication to your personal clinical practice or health care as a whole

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd