What is the significance of nevis island

Assignment Help Computer Network Security
Reference no: EM13781651

The scenario description and requirements:

Prepare a short research paper of approximately 900-1000 words, double-spaced, exclusive of cover, title page, table of contents, [actually cover/title page and TOC are not required] endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end.  Submit the paper in your assignment folder as a Word document.

Scenario:  Sandra changes banks following her troubles with MBT. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system. Sandra creates a key pair and supplies to Fiona, an officer of UST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a thumb drive which he keeps locked in a wall safe at her home. In turn, Fiona gives Sandra access to a key server maintained by UST so that she can readily obtain Fiona's current public key {eF, nF} whenever she needs to communicate securely with Fiona.

Things are fine for several months until Sandra sends Fiona a message m asking about current interest rates on Certificates of Deposit issued by UST. As shown below, she enciphers the message first, and then signs it

c = (meF mod nF)dA mod nA

Where C is the encrypted message and m is the plaintext message.

A few days later, Sandra received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Fiona transferred the money out of Sandra's account into an account of her own in a bank on the Caribbean island of Nevis. When reached via long distance in Nevis, Fiona produced a message 'g'from Sandra saying: "Thanks for your excellent service, Fiona. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Sandra."

Sandra files suit against Fiona, UST and the government of the Nevis, claiming that the message was a forgery sent by Fiona herself, asking for triple damages for pain and suffering. Fiona has responded by claiming that all procedures were followed properly and that Sandra is filing a nuisance suit.

You have been employed by UST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Sandra issue. You obtain Fiona's private key from the UST server, and the cipher text C, and calculate

( ceA mod nA)dF mod nF) = g

Where g is the plain text message which was obtained the cipher text C.

Your report to the UST Board of Directors should address the following issues:

  • From the facts as presented what can be determined about Sandra's intentions to make Fiona a gift of $1,000,000? How did the fact help you in forming your conclusion?
  • What is the significance of Nevis Island?
  • What is the significance of Sandra's message to Fiona asking for interest rates?
  • Assuming UST wishes to continue using RSA as its cryptographic system, what UST and Sandra could have done to protect against this controversy arising?
  • How to proceed in the litigation

Your report should clearly address these issues including recommendation for the Sandra's suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Sandra, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

Verified Expert

Reference no: EM13781651

Questions Cloud

Monitor quality performance of their wire wrapping operation : A computer manufacturer has decided to initiate a control chart program to monitor the quality performance of their wire wrapping operation on their circuit boards. The boards are randomly tested and those that fail are sent back for rework.
Controversial corporate social responsibility concern : Specify one (1) controversial corporate social responsibility concern associated with your selected organization.
Write brief explanations about american elections : Write brief explanations about American Elections
High self-esteem in children : In the US, a common worry of parents is whether their children have a high self-esteem. In the age of increased awareness of the ramifications of bullying behavior (physical, verbal, and relational-aggression), as well as increased competition it..
What is the significance of nevis island : ndra changes banks following her troubles with MBT. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system.
Create a powerpoint presentation about snapchat : Create a powerpoint presentation about snapchat.
Explanation about the irony related to american voters : Write a brief explanation about "The irony related to American voters being candidate centered within a party-driven political system"
Explain the importance of brainstorming : Explain the importance of brainstorming. What are the three most important approaches to brainstorming? Explain a situation in which brainstorming could achieve innovative results
Value on individualism and individual effort : How do you explain the popularity of work teams in the United States when U.S. culture places such high value on individualism and individual effort? Have you experienced work teams in your workplace? How was your team experience?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd