What are the ways used to distribute public key

Assignment Help Other Subject
Reference no: EM133306456

Part A This part consists of six questions. Answer all questions.

Question 1
a) An attacker compromised a system of internal network from a remote place. Then, the compromised system has been used to redirect all packets destined to a web server. Identify the type of attacks launched by the attacker. Explain the attack scenario with figure.

b) The following text is the output of CAESAR cipher: Wigyvmxc. Find out the key and the corresponding plaintext.

Question 2
Suppose, you are the administrator of an information system where every registered user can access the public keys of any other users. Alice and Bob are registered users of the system. Now, as part of a business process, Alice wants to send sensitive data to Bob using a symmetric-key encryption scheme. However, Alice and Bob do not share any secret key currently. They do not have any secure physical channel which can be used to exchange secret keys safely without encryption. Given the constraints, is it possible for Alice and Bob to exchange sensitive data using a symmetric-key encryption? If possible, explain how.

b) What are the four ways used to distribute public key?

Question 3
a) Suppose, a network consists of four different nodes (A, B, C and D). How many keys do they have to generate such that A, B and C can communicate with D in a bidirectional secure way using the DES algorithm? How many keys do they have to generate such that every pair of nodes can communicate in a bidirectional secure way using the same algorithm? How many keys do they need to generate for both scenarios while using 3DES algorithm?

b) Symmetric encryptions (e.g., AES) can provide data confidentiality like public-key algorithms. What are the two issues that can mainly be addressed by public-key cryptography? Justify your answer in brief.

Question 4
a) Suppose, an LFSR has the following feedback polynomial function: 1 + X2 + X3. Draw the LFSR and also find the bit stream period to determine whether the function is a primitive polynomial.

b) What are the different ways to identify abnormal network behaviour? List at least four of them.

Question 5
a) Compare and contrast with figures between application-level gateway and circuit-level gateway firewalls.

b) What are the two ways to protect password files?

Question 6
a) The following table shows a couple of encryption algorithms and their key sizes employed by TLS and WTLS:

      Algorithm

TLS Key Size (bits)

WTLS Key Size (bits)

          3DES

         168

            40

          IDEA

         128

         40 or 56

Explain why in these cases for the same algorithms WTLS uses shorter keys.

b) Consider a commercial information system which supports data transmission between peer users and between servers and users on the Internet. The system administration team is concerned on data integrity in their servers. Name an access control model, which can be used to protect data integrity. Explain how the model works.

c) How does the recipient in PGP identify the public key of sender?

Part B
This part consists of twoquestions. Answer all questions.

Question 1

a) Consider an application based on wireless communications, which requires a session key of length 15 (that is, 15 bits). For the key to be robust against any brute-force attack, it is required that the session key does not contain any repeating patterns. The following is a linear feedback shift register (LFSR)of length 4. Answer the following questions:

127_Wireless communications.jpg

 

Given the initial bits x1=1, x2=1, x3=0, and x4=1,can a session key that meets the above security requirement be produced by this LFSR? If so, write the first 15 bits of the output stream of the above LFSR. If not, find the period of the output stream.

b) Write a program in shell script that will take an integer value from the useras input and check whether the number is odd or even. The program should continue forn times. See below the sample input and output of the program.

How many times you want to enter the number? 3
Number 1: 10
It is an even number!
Number 2: 7
It is an odd number!
Number 3: 0
Please enter a number greater than 0.

Question 2

a) Suppose the alphabet for creating passwords consists of 10 characters. Without loss of generality, we denote it as A = (a1, a2,a3,a4,a5,a6,a7,a8,a9,a10). Suppose each password must contain 8 characters. How many potential passwords do we have?

b) Suppose among all potential passwords, 1% of them can be viewed as "bad passwords". Given a password, to check whether or not it is a good password, we can compare it with all the "bad passwords" one-by-one. Using this procedure, how many comparisons do we have to operate in the worst case?

c) Given the dictionary of "bad passwords", which is denoted as D, consisting of all the "bad passwords", suppose the matrix of transition probability of a Markov model is given as

116_matrix.jpg

 

where the entry at row i and column j in the above matrix, T(i, j), represents the probability that the character ai is followed by aj in the dictionary, that is, the frequency of the occurrence of the bigram aiaj in the dictionary of "bad passwords". Now, you are given a password, a1a2a4a1a10a5a3a1. Is this a good password? Explain.

d) The Hamming distance between two points, (x1, x2, K, xn) and (y1, y2, K, yn), is defined as:

dH(x1, x2,,.....xn),(y1,y2,......yn))=#{i; xi≠yi}

that is, the number of coordinates where (x1, x2, K, xn)and(y1, y2, K, yn)differ. Given the following data items which are points in the 4-dimensional space, for each pair of data items, calculate the Hamming distance between them:

(1,0,1,0), (1,1,1,0), (1,0,0,0), (0,1,0,1)

Which data point is the most distant one from other data points with respect to the Hamming distance?

Reference no: EM133306456

Questions Cloud

Calculation of net passive income : Which of the following items of income, gain, loss, or deduction will be included in the calculation of net passive income?
What a company can gain by pursuing financial and social : What a company can gain by pursuing financial/competitiveness objectives and social objectives (CSR) together and what capabilities it must have in order
Explain the strength of ties to home concept using : Explain the 'strength of ties to home' concept using, as an example, the integration of qualified immigrants (QIs) into an international workforce.
What trainer will do before training session to facilitate : Exactly which methods/techniques you are using at each step of the training session and why you are using each method/technique at this point?
What are the ways used to distribute public key : What are the four ways used to distribute public key and What are the two issues that can mainly be addressed by public-key cryptography? Justify your answer
Evaluate whether stu will need to use a convergent approach : Evaluate whether STU will need to use a convergent or divergent approach to one of the following HR practices: Recruitment and Selection, Diversity
What are implications of content for you as a student at llu : Do you agree with this statement? What are the implications of the content for you as a student at LLU? Do you have recommendations for how to address the issue
Audit committee report and auditors report : Discuss the difference between the Audit Committee Report and Auditors Report. What is the basic information discussed in these two reports?
Discuss how the protagonist expectations are similar : Discuss how the protagonist's expectations are similar to what has come to be known as the American Dream - the assumption that ambition, hard work

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd