What is the plain text m

Assignment Help Computer Network Security
Reference no: EM13662303

Question 1:

In problem, we will compare the security services that are provided by digital signatures (DS) and message authentication codes (MAC). We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS. State whether and how (i) DS and (ii) MAC protect against each attack. The value auth (x) is computed with a DS or a MAC algorithm, respectively.

a. (Message integrity) Alice sends a message x = 'Transfer $1000 to Mark° in the clear and also sends auth (x) to Bob. Oscar intercepts the message and replaces "Mark" with "Oscar." Will Bob detect this?

b. (Replay) Alice sends a message x = ^Transfer $1000 to Oscar^ in the clear and also sends auth (x) to Bob. Oscar observes the message and signature and sends them 100 times to Bob. Will Bob detect this?

c. (Sender Authentication with cheating third party) Oscar claims that he sent some message x with a valid auth (x) to Bob, but Alice claims the same. Can Bob clear the question in either case?

d. (Authentication with Bob cheating) Bob claims that he received a message x with a valid signature auth (x) from Alice (e.g.,"Transfer $1000 from Alice to Bob") but Alice claims she has never sent it. Can Alice clear this question in either case?

Hint Decryption is not as hard as you think; use some finesse.

Question 2:

In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M?

1 Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root a = 2.

a. If user A has public key Yq = 9, what is A's private key XA?

b. If user B has public key Ya = 3, what is the shared secret key K?

Reference no: EM13662303

Questions Cloud

Suppose all the energy is transferred to the gas : A chamber with a fixed volume of 1.0 m   3 contains a monatomic gas at 3.00*10   2 K. The chamber is heated to a temperature of 6.00*10    2 K. This operation requires 20.0 J of heat. (Suppose all the energy is transferred to the gas.) How many gas m..
What is the speed of the heavier fragment : An unstable particle at rest breaks up into two fragments of unequal mass. The mass of the lighter fragment is 2.00*10-28 kg, and that of the heavier fragment is 1.64*10-27 kg. If the lighter fragment has a speed of 0.893c after the breakup, what is ..
Heat energy-how much does temperature increase : 121.7 J of heat energy are transferred to 38.53 g of mercury. By how much does the temperature increase? (in K) How much heat is needed to raise the temperature of 38.53 g of water with the same amount?
Show the effective jpy cost of acquiring one usd : Plains States is considering several hedging alternatives for its receivables to reduce the exchange rate risk arising from the sale -  What is the effective JPY cost of acquiring one USD?
What is the plain text m : We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS - Will Bob detect this
Case study analysis and presentation : Case study analysis and presentation - Given the Subject Calendar (refer to Subject Outline) and contingent on which case study has been allocated to them, some students may have to study ahead of a lecture and topic being presented in c..
Distribution of the number of halloween treats : What is the Z score of a child eating 20 treats - what is the Z score of a child eating 5 treats and faculty or administrative staff member
Create a transformation matrix : Find the transformation matrix T02, i.e. T defining {0} with respect to {2}. Learn how to compute the inverse of T20 to get this. Verify that this works by using tranimate to view the movement of frame
Provide notes as part of the annual report : You required to provide notes as part of the annual report. For the statement of changes in equity, and the income statement below can you provide notes.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

  Write down a class code that outputs a security code the

question 1 write a class called message that prompts the user to enter a message of three words as one string where

  What is ciphertext generated by encryption of character

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes. What is the ciphertext (in binary form) generated by the encryption of the character D?

  Write down a 1000- to 1500-word paper on at least three

write a 1000- to 1500-word paper on at least three major information security threats that a specific organization you

  Difference between the terms safety and security

What is the difference between the terms ‘safety' and ‘security' and what is the conclusion of the paper?

  Personal information entered on these websites become

facebook email electronic commerce and collaborative sites for both work and leisure are a normal part of our everyday

  Virtualization software and operating systems

Write a one page synopsis of your experience in loading the virtualization software and operating systems. Include what you learned in the process.

  How clark -wilson model is implemented on computer system

Assume that the Clark -Wilson model is implemented on a computer system. Could a computer virus that scrambled constrained data items be introduced into the system?

  Analyze the security of the system compriosing the size of

alice has a picture-based password system where she has each user pick a set of their 20 favorite pictures say of cats

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Research commercial data repositories be sure to understand

in this writing assignment you will create a brochure advertising your services as a data repository.research

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd