What is the significance of nevis island

Assignment Help Computer Engineering
Reference no: EM131740398

Short Paper Assignment

Description: The scenario description and requirements for Short Paper #2:

Prepare a short research paper of approximately 900 to 1000 words, double-spaced, exclusive of cover, title page (optional), table of contents (optional), endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word attachment.

Ann changes banks following her troubles with UBT. At her new bank, First Security Trust (FST), RSA is used as the cryptographic system. Ann creates a key pair and supplies to Felicity, a manager of FST with her public key {eA, nA}, securing her private key {dA, nA} on a thumb drive which she keeps locked in a wall safe at her home. In turn, Felicity, who is designated to handle Ann's business, gave Ann access to a key server maintained by FST so that she can readily obtain Felicity's current public key {eF, nF} whenever she needs to communicate securely with Felicity.

Things are fine for several months until Ann sends Felicity a message m asking about current interest rates on Certificates of Deposit issued by FST. As shown below, she enciphers the message first and then signs it

C = (meF mod nF )dA mod nA

Where C is the encrypted message and m is the plaintext message.

A few days later, Ann received a statement that shows a debit of $1,500,000 from her account. On inquiring, she was told that Felicity transferred the money out of Ann's account into an account of her own in a bank on the Caribbean island of Nevis, where she moved. When reached via long distance in Nevis, Felicity produced a message 'g' from Ann saying:

"Thanks for your excellent service, Felicity. Please transfer $1,500,000 from my account to yours as a token of my esteem and appreciation. Signed, Ann."

Ann files suit against Felicity, FST and the government of the Nevis, claiming that the message was a forgery sent by Felicity herself, asking for triple damages for pain and suffering. Felicity has responded by claiming that all procedures were followed properly and that Ann is filing a nuisance suit.

You have been employed by FST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Ann issue. You obtain Felicity's private key from the UST server, and the cipher text C, and calculate

g= (CeAmodnA)dFmodnF

Where g is the plain text message which was obtained the cipher text C, dF is Felicity's Private key Your report to the FST Board of Directors should address the following issues:

From the facts as presented what can be determined about Ann's intentions to make Felicity a gift of $1,500,000? How did the fact help you in forming your conclusion?

What is the significance of Nevis Island? Did the significance sway your decision? If yes why? If no why?

What is the significance of Ann's message to Felicity asking for interest rates?

Assuming FST wishes to continue using RSA as its cryptographic system, what FST and Ann could have done to protect against this controversy arising?

How to proceed in the litigation

Your report should clearly address these issues including the recommendation for Ann's suit, RSA with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved. It should give direction to formulate plans for how to approach the immediate legal issue with Ann, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and how it works.

Reference no: EM131740398

Questions Cloud

Host of roles within an organization : Marketing communications serves a host of roles within an organization. Discuss these roles with respect to both pre-purchase and post-purchase phases.
Discuss one to three pieces of evidence : Discuss one to three (1-3) pieces of evidence / artifacts from your previous coursework to support your analysis.
What would you suggest mary jane do : The Fair Credit Reporting Act. The ABC department store refuses credit to Mary Jane. Mary Jane has a good job and no debts. She cannot understand the refusal.
What do you admire about our education : Consider What are the similarities and differences in educational systems in different countries? What do you admire about another educational system?
What is the significance of nevis island : What is the significance of Nevis Island? Did the significance sway your decision? If yes why? If no why? How to proceed in the litigation?
Describe the equal credit opportunity act : The Equal Credit Opportunity Act Jane Thomas applies for automobile financing at Kenwood Cars, Inc., a used-car dealership. The dealership obtains a credit.
Find an article on facility design in the physical education : Find an article on facility design in the physical education, recreation, or sports field and write a short one page summary.
What factors must eis take into consideration : Your firm has been hired to build a large government facility near a residential neighborhood. A committee of residents has been formed to oppose the building.
What legal difficulties may akins face : Air Pollution The Akins Corporation wishes to build a new smelting facility in Owens County, an area where air pollution exceeds primary air quality standards.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd