What does alice need to know in order to verify carol answer

Assignment Help Computer Engineering
Reference no: EM131458298

ASSIGNMENT

Scenario assignment 1: Cryptography

Review the following questions and provide your responses in a Word document. In answering each prompt, be sure to defend your answers and explain how you have arrived at your solution.

1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why does this not solve the problem?

Hint: We know of a protocol that uses this technique in an attempt to gain security.

2. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key, K, then Bob could impersonate Carol to Alice (actually any of the three could impersonate the other to the third). Suppose instead that each had their own secret key; so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her identity, responds to a challenge with a function of his or her secret key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol's answer to Alice's challenge?

3. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key and for which the only way to break it is a brute-force attack of trying all possible keys. Then, suppose the performance for the good guys is adequate (e.g., it can encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size key. Finally, suppose advances in computer technology make computers twice as fast. Given that both parties--- the good guys and the bad guys--- get faster computers, does this advancement in computer speeds work to the advantage of the good guys? The bad guys? Or does it not make any difference?

In each of your responses to the above scenarios, please ensure that you provide a brief explanation of why you chose to take your mentioned actions.

Guidelines for Submission: Your responses for each prompt must be submitted as three to four paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. (graduate courses). Make sure you cite if you take a piece of someone's work, very important and your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references. No heavy paraphrasing of others work.

Reference no: EM131458298

Questions Cloud

Elaborate on the steps and processes you would have to do : Elaborate on the steps and processes you would have to do to try to insure that your recovery plan would work in the event of a disaster.
What is the hjm libor model : In the HJM libor model, is it a simple interest rate or a continuously compounded interest rate that follows a lognormal distribution?
Briefly explain the meaning of the acid properties : Briefly explain the meaning of the ACID properties and some concurrency issues with respect to the project.
What are the main flaws of the bcg matrix : What are the main flaws of the BCG matrix? How can this be overcome?
What does alice need to know in order to verify carol answer : We know of a protocol that uses this technique in attempt to gain security. What does Alice need to know in order to verify Carol's answer to Alice's challenge?
Review the case of liability management at general motors : Liability Management at General Motors (Harvard Business School Case 293123-PDF-ENG). The case studies issues related to managing the liability structure.
Calculate the total interest paid for each loan option : Choose a home for sale in Volusia or Flagler County to use for your calculations. Calculate the total interest paid for each loan option
Table for consideration to overcome the problem : Strategies proposed by the different departments of the company and put on the table for consideration to overcome the problem included:
What is the arbitrage-free price of this call option : For the single-period evolution given in the preceding figure, consider a European call option with maturity date 1 and strike price k = $0.92.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss two approaches to system development

Discuss two approaches to system development. Describe system analysis and the major activities that occur during this phase of the systems development life cycle.

  Write down a sub query by using the books and publisher

write a sub query using the books and publisher table to list the isbn book title and the retail price for every book

  Write the code to dynamically allocate memory

Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27.

  The chief executive has some sympathy with the notion that

woolsmorth is a large retail company specializing in groceries and clothing. it was founded in 1995 and currently has

  Write a gui-based program that manages an auction of several

Write a GUI-based program that manages an auction of several items.

  Questionin situation of parallel computing platform

questionin situation of parallel computing platform describe-i bisection width ii arc connectivity iii diameter

  Why using euler''s method is the simplest numerical method

This is being solved by computer code in c++ to obtain numerical approx to ODE. Using Euler's method is the simplest numerical process for approximation solving initial value ODE'S.

  Create a document which defines and describes it

Create a document which defines and describes IT. You may use any resource; however, be sure to cite any resources you use

  Define a set of language primitives to be used by gp

COSC 5P71 GP: Assignment - Define a set of language primitives to be used by GP. These primitives should work sensibly on the input data and you should randomly shuffle the rows. Then split the table into 2 independent sets of examples - a training ..

  Explain what is an affiliate program

Describe what is an affiliate program, and how it works. explain the advantages and disadvantages of using an affiliate program. Give some examples of successful affiliate programs.

  Calculate button finds charges and displays them in controls

Job Information FormThe Job Information form must have text boxesfor the user to enter the job number, customer name, amount charged forparts, and the hours of labor. Include labels and text boxes for Parts,Labor, Subtotal, Sales Tax, and Total.

  What will be some risks and opportunities

Read the article "The Top 20 (Plus 5) Technologies for the World Ahead" by James H. Irvine and Sandra Schwartzbach, discuss the key findings you believe have implications for the business world. Do you agree with the authors.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd