What is the purpose of including message authentication code

Assignment Help Computer Engineering
Reference no: EM131722756

Order the following four items to match with the process of digital signature generation and verification: (circle one)

1. Encrypt the digest with your private key.

2. Compare the message digest to one you created.

3. Generate a message digest.

4. Decrypt the signature with the sender's public key.

A. 4, 2, 1, 3
B. 1, 4, 3, 2
C. 3, 1, 4, 2
D. 3, 4, 2, 1

2. What is the purpose of including Message Authentication Code (MAC) with the message?

3. What is the difference between a MAC and a HMAC?

4. Who generates the authenticator in Kerberos and what is the purpose of the authenticator?

5. What primary problem does public-key cryptography solve?

6. Which of the following statements are true about Diffie-Hellman (D-H) key exchange?

A. The security of the scheme depends on it being difficult to solve ax = b mod n for a given b, n and x
B. The security of the scheme depends on it being difficult to solve ax = b mod n for x given a, b and n

7. Suppose a One-way hash function is used in a message exchanged between Alice and Bob.

A. Provide an example forgery scenario if the hash function lacks weak collision resistance property.

B. Provide an example forgery scenario if the hash function lacks strong collision resistance property.

8. A. Decrypt the following English cipher-text which has been produced by using substitution (Caeser) cipher:
kbkxeutk (Hint: Use the frequency distribution table of the letters of English language and the Vigenere Tableau given at the end of this script)

B. Consider a substitution cipher where 52 symbols were used instead of 26. In particular, each symbol in the cipher text is for either a lowercase English letter, or an uppercase English letter. For example, let E be the encryption function then we could have E(A) = T and E(a) = m. Such a modification augments the key space to 52! (52 factorial). Does this provide added security compared to a standard substitution cipher? Why or why not?

9. Suppose Alice wants to send a message to Bob containing her name N, her computers IP address IP, and a request R for Bob. Design encrypted messages that Alice must send to meet the security requirements below. Suppose that K-A and K-B are the private keys of Alice and Bob respectively.

Assume that Alice and Bob share a symmetric key K and have securely distributed their public keys K+A and K+B to each other. Assume that all the messages include Alice's name, IP address, and the request.

Recall the notation that x||y means the concatenation of x with y, {x}k denotes the encryption of x using key k, and that h(x) denotes a hash of x. Using the notation above, answer each question below using a message exchange diagram (like the ones we used in class), being specific about what is computed, what is transmitted, and who the sender and receiver of the message is.

A. Using the symmetric key, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

B. Using the symmetric key, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages
integrity and source.

C. Using public key cryptography, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

D. Using public key cryptography, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages integrity and source.

10. A. Illustrate how Meet-in-the-Middle attacks can be devised with a double DES encryption scheme? How does 3DES protect against this attack.

B. Explain the self-healing property of cipher block chaining mode.

11. A. Perform encryption and decryption using the RSA algorithm where p = 3, q = 11, e = 7, and M = 5.

B. Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root g = 2.

i) If user A has public key Ya = 9. What is A's private key Xa?

ii) if user B has public key Yb = 3, what is the shared secret key K?

12. A. A system allows the user to choose a password with a length of one to five characters, inclusive. Assume that 10,000 passwords can be tested per second. The system administrators want to expire passwords once they have a probability of 0.10 of having been guessed. Determine the expected time to meet this probability under the condition that the password characters may be any number from 0 to 9.

B. Does using passwords with salts make attacking a single account more difficult than using passwords without salts? Explain why or why not.

Reference no: EM131722756

Questions Cloud

Reflecting on the four modules completed this session : Reflecting on the four modules completed this session, identify the specific readings, assignments, and discussions you found most valuable and enjoyable.
Make an inference about the population : Suppose the psychologist actually observes y¯ = 6.2. Based on your answer to part a, make an inference about the population from which the sample was selected.
Where are there breaches of ethical behavior : hink about the evidence that helps to make your case and use it. Address the following questions: What are the ethical issues?
Combining choppy sentences : Combine each pair of sentences by subordinating minor ideas or by coordinating ideas of equal importance.
What is the purpose of including message authentication code : What is thec (MAC) with the message?
Construct a stem-and-leaf display for light loss percentage : Eclipses of Saturnian satellites. Saturn has five satellites that rotate around the planet. Astronomy (August 1995) lists 19 different events involving.
How to address an employee sexual harassment complaint : How to address an employee sexual harassment complaint? Review the article titled How Do I Plan a Human Resource Training Program in an Organization Setting?
Congressional aspirants who desire to think : The creation of a third political party-the independent party-would allow Congressional aspirants who desire to think for themselves to claim
Avoid that particular poison taste in the future : That's because some rats eat enough poison to die but others eat only enough to become sick and then learn to avoid that particular poison taste in the future.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Security experts agree that average home computer

Security experts agree that average home computer users have very little knowledge regarding how to make their computers secure

  What are the two largest gui implementations for linux

What are the two largest GUI implementations for Linux? Explain how it can crack the password so quickly using hash values when you don't have a supercomputer.x

  Questiongiven following sequence of events interrupt

questiongiven following sequence of events interrupt requests irqi show which services routines cpu is executing for

  Write the program in java

Write the program in Java (with a graphical user interface) so that it would allow the user to select which way they want to calculate a mortgage: by input of the amount of the mortgage.

  Conduct some research to find a recent example of a change

If this aspect of your plan were not addressed, how would productivity, morale, or efficiency within the organization suffer? Support your reasoning with specific examples based on your scenario.

  Project descriptionin this project you will work with a fax

project descriptionin this project you will work with a fax cover sheet an application letter and a resume. to complete

  Define what data management considerations

What data management considerations are there with this acquisition strategy

  Analyze how the data breach could have been prevented with

write a three to five page paper on your selected case in which youdescribe the data breach incident and the primary

  Discuss about the general sampling

Write a report addressed to Mason & Jarr stating whether they did or did not observe the essential elements of auditing standards in each case.

  What is bootstrap and what is responsive web design

CSET3200 Assignment - Web Services- HTML& CSS. What is Bootstrap? What is Responsive Web Design? Why Use Bootstrap? Where to Get Bootstrap

  Create a free surveymonkey or questionpro online

create a free surveymonkey or questionpro online questionnaire account. if you did not create one revisit the week 5

  Make an initial linked list of students and grades

Modify an existing student in the linked list.make an initial linked list of students and grades.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd