What is the significance of nevis island

Assignment Help Computer Network Security
Reference no: EM13188256

Scenario:  Stella changes banks following her troubles with SHB. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system. She creates a key pair and supplies Fiona, an officer of UST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a floppy disk which she keeps locked in a wall safe at her home. In turn, Fiona gives Stella access to a key server maintained by UST so that she can readily obtain Fiona's current public key {eF, nF} whenever she needs to communicate securely with Fiona.

Things are fine for several months until Stella sends Fiona a message m asking about current interest rates on Certificates of Deposit issued by UST. As shown below, she enciphers the message first, and then signs it:

869_What is the significance of Nevis Island.png

A few days later, Stella received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Fiona transferred the money out of Stella's account into an account of her own in a bank on the Caribbean island of Nevis. When reached via long distance in Nevis, Fiona produced a message g from Stella saying: "Thanks for your excellent service, Fiona. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Stella."

Stella files suit against Fiona, UST and the government of the Nevis, claiming that the message was a forgery sent by Fiona herself, asking for triple damages for pain and suffering. Fiona has responded by claiming that all procedures were followed properly and that Stella is filing a nuisance suit.

You have been employed by UST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Stella issue. You obtain Fiona's private key from the UST server, and the cipher text c, and calculate 

613_What is the significance of Nevis Island1.png

Your report to the UST Board of Directors should address the following issues:

  • From the facts as presented what can be determined about Stella's intentions to make Fiona a gift of $1,000,000?
  • What is the significance of Nevis Island?
  • What is the significance of Stella's message to Fiona asking for interest rates?
  • Assuming UST wishes to continue using RSA as its cryptographic system, what UST and Stella could have done to protect against this controversy arising?

Your report should clearly address these issues including recommendation for the Stella's suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Stella, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

Reference no: EM13188256

Questions Cloud

What is the single most important new technology : Need a research paper on "What is the single most important new technology that has affected digital forensics in the last five years and why?" The paper has to be well referenced.
Use cylindrical coordinates to evaluate the triple integral : Use Cylindrical coordinates to evaluate the triple integral SSS_E sqrt(x^2+y^2)dV, where E is the solid bounded by the circular paraboloid z=16-1(x^2+y^2) and the xy-plane.
Explain what is the dissociation constant kd : What is the dissociation constant, Kd, of a ligand with a percent occupancy (or fractional saturation) of 20% when
Write out the payoff matrix for a game : If both bid the same amount, the $100 is split evenly between them. Assume that each of them has only two $1 bills on hand, leaving three possible bids: $0, $1, or $2. Write out the payoff matrix for his game, and then find its Nash equilibrium.
What is the significance of nevis island : What is the significance of Nevis Island and what is the significance of Stella's message to Fiona asking for interest rates?
State minor component that can be hydrolyzed : minor component that can be hydrolyzed to yield eugenol and acetic acid. What is the structure of the minor component, which has the molecular formula C12H14O3
Is george consuming 200r and 400b : With the per-unit prices of broccoli (B) and pork rinds (R) equal to $2 and $1 respectively, a consumer George, with an income of $1,000 purchases 400R and 300B. At that point, the consumer's MRSBR = 2R/1B.
Compute and compare the enthalpy of monobromination : calculate and compare the enthalpy of monobromination and monochlorination for the given alkyl position
Compute delta g for the expansion : argon expands from 25.0 L to 35.0 L at a constant temperature of 350 K. Calculate delta G for the expansion.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  C program encryption-decryption system using caesar cipher

Program "Encryption/Decryption"system only the code by using C programming work with PUTTY use Caesar cipher.

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  Use prevention-detection and recovery to secure records

Iit is highly desirable that whoever treats you has access to your record. Using your justification how would you use prevention, detection and recovery to secure the records?

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Security by obscurity

Defacement, Infiltration, Phishing, Pharming, Insider Threats, Click Fraud, Denial of Service, Data Theft/Loss, IP Whitelisting and IP Spoofing, recursive PHP functio, worm and a virus, hash on a string using MD5

  Access control models

Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

  Estimating resources with the budget

Managing a project and I have an $850,000 budget. For the project, the resources include 4-developers and on project manager. A suppose that the average workweek per person is forty hours

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd