What is the technology behind oauth

Assignment Help Computer Network Security
Reference no: EM131668920

Assignment: Townsville & Cairns

Aim: This assignment is designed to help you improve your critical thinking and problem solving skills, as well as your information literacy skills (i.e. the ability to select and organise information and to communicate it effectively and ethically).

Requirements, Method of Submission, and Marking Criteria:

• Answer all of the following questions in a single document. Each question should begin on a new page.

• For each of the first two (2) questions, write a report of approximately 1000 words in the structure of a scientific paper.

• Include your name on the first page. Include list of references for each question with proper in-text citations.

• For marking criteria of the first 2 questions, see the included rubric.

• In your answer to question 3 (i.e., cryptanalysis), show all your work. Four (4) marks are assigned to the determination of the correct key-length, four marks to the determination of correct keyword and two marks for determination of the complete plaintext (partial marks count).

• Upload your solution to the Assignment Box, located in the subject's site.

1. Bring Your Own Device (BYOD) Policy

Use the Internet to locate BYOD Policy from two different organizations. After reading that information, create your own BYOD policy for your school or place of employment. What restrictions should be enforced? What control should the organization have over the personal devices?
Write a short (approximately 1000 words) report on your research.

2. Open Authentication (OAuth)

Use the Internet to research OAuth. What is the technology behind it? What are its strength? What are its weaknesses? Will it replace OpenID? Would you recommend it for secure applications like online banking?

Write a short (approximately 1000 words) report on your research.

3. Cryptanalysis of Polyalphabetic Ciphers:

In this question you learn a classical polyalphabetic substitution cipher (known as Vigen´ere cipher), and are required to cryptanalysis a given cryptogram. Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding ciphertext within an appropriate time frame.

Background

Julius Caesar used a cipher which moved each letter of the alphabet to the letter three to the left in the predetermined order of the letters of the alphabet. Figure 1 shows original English alphabet and corresponding cryptogram alphabet in Caesar cipher:

a b c d e f g h i j k l m n o p q r s t u v w x y z d e f g h i j k l m n o p q r s t u v w x y z a b c

Figure 1: English alphabet letter and their corresponding cryptograms in the Caesar cipher

In order to use mathematical notations, let convert letters of the alphabet to integers. The most natural conversion is to assign to each letter an integer which indicates the position of the letter in the alphabet. That is, assign 0, 1, ... , 24, 25 to a, b, • • • , y, z, respectively. Using this conversion, Caesar cipher can be expressed as:

C = Ek(M ) = M + 3 (mod 26)

where ‘C' is the cryptogram, ‘E' is the encryption algorithm, ‘k' is the key, ‘M' is the message/plaintext (one may replace integer 3 by letter ‘d').

Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the original alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are 26 possible keys/shift.

Vigen´ere Cipher

In Vigen´ere cipher the key is more than one letter. That is, Vigen´ere cipher can be considered as a combination of n shift ciphers, where n is the key-length (i.e., the number of letters in the keyword). Let the message/plaintext be ‘individual character' and the keyword is ‘host'. Vigen´ere cipher encrypts the message as follows:

Plaintext i n d i v i d u a l c h a r a c t e r
Keyword h o s t h o s t h o s t h o s t h o s
Cryptogram p b v b c w v n h z u a h f s v a s j

That is, the first four letters of cryptogram computed as:

‘i' + ‘h' = 8 + 7 = 15 (mod 26) i.e., p
‘n' + ‘o' = 13 + 14 = 1 (mod 26) i.e., b
‘d' + ‘s' = 3 + 18 = 21 (mod 26) i.e., v
‘i' + ‘t' = 8 + 19 = 1 (mod 26) i.e., b

Since the plaintext is longer than the keyword, keyword is repeated till all letters of the plaintext are encrypted. As it can be seen, a particular letter of the plaintext may be encrypted with different letters from the keyword. For example, the first occurrence of letter ‘i' from the plaintext is encrypted with ‘h', where its second and third occurrences are encrypted with letters‘t', and ‘o' respectively. That is, Vigen´ere cipher is a polyalphabetic substitution cipher.

To break a polyalphabetic substitution cipher, the cryptanalyst must first determine the period (i.e., the key-length) of the cipher. This can be done using two main tools: the Kassiski method, and the index of coincidence. Here we explain Kassiski method, you may search the Internet for the index of coincidence method.

The Kassiski method uses repetitions in the ciphertext to give clues to the cryptanalyst about the period. For example, suppose the plaintext ‘to be or not to be' has been enciphered using the key ‘now', producing the ciphertext below:

Plaintext t o b e o r n o t t o b e
Keyword n o w n o w n o w n o w n
Cryptogram g c x r c n a c p g c x r

In the given cryptogram (i.e., g c x r c n a c p g c x r) contains the pattern g c x r which is repeated and the distance of repetition is 9. This could be the sign in which the same letters from plaintext is encrypted with the same letters from the keyword. Since in Vigen´ere cipher the keyword is repeated, the key-length is probably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Assuming that the key length is 3, we split the cryptogram into three cryptogram. That is, the 1st, 4th, 7th, ... characters of the cryptogram are the result of the shift of the 1st, 4th, 7th, ... characters of the plaintext where the shift is the first letter of the keyword. Similarly, the 2nd, 5th, 8th, ... letters build another list. That is, this Vigen´ere cipher is a combination of 3 Caesar cipher.

Your Task:

In the following you can find 10 cryptograms, that are created by Vigen´ere cipher, where the plaintext is English text and the keyword is meaningful English word. You are required to decipher the cryptogram that matches with your Student-ID.

Attachment:- Townsville-and-Cairns.pdf

Reference no: EM131668920

Questions Cloud

Create the systems implementation plan document shell : Create the Systems Implementation Plan document shell that includes the sections denoted below. Requirements based upon your own individual views specify.
Caribbean and southern usa : Recently hurricanes Harvey and Irma have gone through the Caribbean and southern USA (Florida and Texas).
Calculate the funds invested in risk-free securities : Other secured loans plus signature loans may not exceed the funds invested in risk-free securities. How should the $2 million be allocated to each of the loan.
Type of hypothetical start-up business : Suppose you are the owner of any type of hypothetical start-up business. Suppose your total revenue is currently increasing when you use more inputs
What is the technology behind oauth : Use the Internet to research OAuth. What is the technology behind it? What are its strength? What are its weaknesses? Will it replace OpenID?
When should cost realism analysis be performed : When should cost realism analysis be performed?
Why did marx call free workers under capitalism wage slaves : What is the household labor debate and how does it relate to Marx's concept of capitalist exploitation?
Discuss the licensure process in your state : Discuss the licensure process in your State. What are the costs involved? How often is your State's Real Estate Sales License offered?
Possible impacts of an improved fertilizer : Discuss THREE possible impacts of an improved fertilizer on the production possibility frontier from part a.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Variation of rsa encryption and decryption

Why would a variation of RSA encryption/decryption where a single prime number is used the modolus insecure? How can someone recover a message x from the encrypted value.

  Do you have any experience with pci

Do you have any experience with PCI? Have you worked for an organization that dealt with PCI? HIPAA? SOX? What's your perspective on "compliance" versus "security" or risk reduction?

  Creating a presentation regarding system security

Your quality improvement circle has been assigned the task of creating a presentation regarding system security as it applies to the ability of the general public access to a combined personal and the electronic medical record housed by the hospit..

  Network security auditing tools

Use the Web to conduct research on Network Security Auditing. Write a report which provides a list of and explains the following

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Explain diffie-helman protocol for sending message

In Diffie-Helman protocol, the common modulus is selected as n = 19 and the generator g is chosen to be 2. Alice and Bob select numbers 6 and 10 privately.

  Discusses methods for systems and application security

Write a 1-2 -paragraph summary that discusses methods for systems and application security. Use the completed Pluralsight lesson as your source including key points taken from the lesson.

  Discuss the role of the federal government

CSEC 670 Assignment - How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?

  How do political element within the us affect cyber security

How do political elements within the U.S. affect cyber security? Accurately describe how political elements within the U.S. can affect cyber security?

  Include strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  Test different attack and defense techniques

Test different attack and defense techniques. Performing port scan - environment to test different attack and defense techniques.

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd