What is the plain text m

Assignment Help Computer Network Security
Reference no: EM13662303

Question 1:

In problem, we will compare the security services that are provided by digital signatures (DS) and message authentication codes (MAC). We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS. State whether and how (i) DS and (ii) MAC protect against each attack. The value auth (x) is computed with a DS or a MAC algorithm, respectively.

a. (Message integrity) Alice sends a message x = 'Transfer $1000 to Mark° in the clear and also sends auth (x) to Bob. Oscar intercepts the message and replaces "Mark" with "Oscar." Will Bob detect this?

b. (Replay) Alice sends a message x = ^Transfer $1000 to Oscar^ in the clear and also sends auth (x) to Bob. Oscar observes the message and signature and sends them 100 times to Bob. Will Bob detect this?

c. (Sender Authentication with cheating third party) Oscar claims that he sent some message x with a valid auth (x) to Bob, but Alice claims the same. Can Bob clear the question in either case?

d. (Authentication with Bob cheating) Bob claims that he received a message x with a valid signature auth (x) from Alice (e.g.,"Transfer $1000 from Alice to Bob") but Alice claims she has never sent it. Can Alice clear this question in either case?

Hint Decryption is not as hard as you think; use some finesse.

Question 2:

In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M?

1 Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root a = 2.

a. If user A has public key Yq = 9, what is A's private key XA?

b. If user B has public key Ya = 3, what is the shared secret key K?

Reference no: EM13662303

Questions Cloud

Suppose all the energy is transferred to the gas : A chamber with a fixed volume of 1.0 m   3 contains a monatomic gas at 3.00*10   2 K. The chamber is heated to a temperature of 6.00*10    2 K. This operation requires 20.0 J of heat. (Suppose all the energy is transferred to the gas.) How many gas m..
What is the speed of the heavier fragment : An unstable particle at rest breaks up into two fragments of unequal mass. The mass of the lighter fragment is 2.00*10-28 kg, and that of the heavier fragment is 1.64*10-27 kg. If the lighter fragment has a speed of 0.893c after the breakup, what is ..
Heat energy-how much does temperature increase : 121.7 J of heat energy are transferred to 38.53 g of mercury. By how much does the temperature increase? (in K) How much heat is needed to raise the temperature of 38.53 g of water with the same amount?
Show the effective jpy cost of acquiring one usd : Plains States is considering several hedging alternatives for its receivables to reduce the exchange rate risk arising from the sale -  What is the effective JPY cost of acquiring one USD?
What is the plain text m : We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS - Will Bob detect this
Case study analysis and presentation : Case study analysis and presentation - Given the Subject Calendar (refer to Subject Outline) and contingent on which case study has been allocated to them, some students may have to study ahead of a lecture and topic being presented in c..
Distribution of the number of halloween treats : What is the Z score of a child eating 20 treats - what is the Z score of a child eating 5 treats and faculty or administrative staff member
Create a transformation matrix : Find the transformation matrix T02, i.e. T defining {0} with respect to {2}. Learn how to compute the inverse of T20 to get this. Verify that this works by using tranimate to view the movement of frame
Provide notes as part of the annual report : You required to provide notes as part of the annual report. For the statement of changes in equity, and the income statement below can you provide notes.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd