What is message integrity

Assignment Help Computer Engineering
Reference no: EM131489512

Midterm Exam -

Problem 1: (a) What is message integrity, and how does a MAC (message authentication code) ensure it?

(b) Draw a diagram that illustrates the way a MAC interacts with a message between Alice and Bob in CBC (cipher block chaining) mode.

Problem 2: What is the GCD of 9774 and 234? Show all work using Euclid's Algorithm. Specifically, show the status after each iteration - you do not need to show computation of remainders.

Problem 3: Consider the private-key ciphers we studied in class (substitution cipher, shift cipher, Vigenere's cipher). Define a chosen-plaintext attack, and explain why the aforementioned ciphers are vulnerable in this attack model. Is the one-time pad vulnerable in this model? The two-time pad (ie, the one-time pad with a re-used pad)? Why or why not?

Problem 4: Prove that 38209001 is not a prime using Fermat's Little Theorem. (Hint: Proceed by contradiction. Assume to the contrary that 38209001 is a prime, and show that this contradicts Fermat's Little Theorem. You may use Wolfram Alpha to compute modular powers.)

Problem 5: (a) Does the set {1, 3} form a group under multiplication modulo 5? Why or why not?

(b) Does the set {1, 6} form a group under multiplication modulo 7? Why or why not?

Problem 6: Answer the following. Fill in the blanks where provided.

(a) What is the identity element in the additive group Zn?

(b) What is the identity element in the multiplicative group Zp?

(c) What is the additive inverse of 18 modulo 29? Hint: your answer must be an integer between 0 and 28.

(d) What is the multiplicative inverse of 19 in Z23?

Problem 7: (a) Encrypt the following phrase using the Vigenere cipher with the keyword COFFEE:

COLDBREWPLEASE

(b) The Vigenere keyword is CWM and the ciphertext is PWFWNMNHK. What is the message?

Problem 8: We wish to find the multiplicative inverse of 18 in Z1491823. Let's follow the following steps:

(a) Use Euclid's Extended Algorithm to find r and s such that

r · 18 + s · 1491823 = 1

Show your work. In other words show the status of the algorithm after each step.

(b) How can you use part (a) to deduce the multiplicative inverse of 18 modulo 1491823?

Problem 9: What is a length extention attack against a MAC and what are ways we could defend against it?

Problem 10: Suppose you have a 50-bit string that contains exactly 37 ones at random positions. How many bits of entropy does this string contain? Show all work.

Problem 11: Write code which implements Euclid's Extended Algorithm. You are to send your code to me via email or Piazza for this problem. If you code does not run, you receive no credit.

I expect you to work independently for problems 1-10, but you may work in a group of up to four students for this problem. Include all group member's names in a readme.txt file in the .zip folder you submit your solution in. Also write your group members' names below (if you are submitting alone, leave blank.)

(1) Self

(2) ____________

(3) ____________

(4) ____________

A sample run of the program would look as follows:

Enter the first number: 192

Enter the second number: 270

The GCD is 6

(u, v) = (-7, 5)

Reference no: EM131489512

Questions Cloud

How do principles of system theory apply to the earth : How do principles of system theory apply to the Earth as a living system? Explain interactions between humans and natural ecosystems.
Wendy sells motor homes in the retail market : If she limits sales to five, she can charge $21,000 each. She will sell six per week if the cost of buying each motor home from the manufacturer.
Tiebout model of local public good provision : Explain why, in the Tiebout model of local public good provision, efficiency will not be achieved if there are externalities across city borders from the public
Advancement of technology on american values : What is the impact of advancement of technology on American values?
What is message integrity : CSCI 360: Midterm Exam. Draw a diagram that illustrates the way a MAC interacts with a message between Alice and Bob in CBC mode
Clip and save at least three different advertisements : Product Differentiation Choose a product offered by several producers that is advertised in newspapers or magazines. Then follow the steps below.
Price and quantity will this cartel maximize its profit : At what price and quantity will this cartel maximize its profit?
Prepare presentation on use of product labeling for safety : Prepare an eight- to ten-slide presentation about the use and limitations of product labeling for public safety. You can use the information from your textbook.
Demand for money and the equilibrium interest rate : How will this change in the price level affect the demand for money and the equilibrium interest rate?

Reviews

len1489512

5/9/2017 4:35:03 AM

This is a take-home exam. No late submissions, no exceptions. You are welcome to use your notes, the lecture materials, your programs, etc. However, you are expected to submit your own work. Please answer the following as completely as possible. Please put your answers in the indicated blanks, and show all work. Unjustifed answers may receive zero credit.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd