Write an RSA key generation algorithm

Assignment Help Computer Network Security
Reference no: EM131998598

Question 1. Alice and Bob, are communicating in the presence of an adversary (attacker with malicious intent) Eve. For symmetric encryption algorithms they use openssl and for public key algorithms they use gpg. For the following set of cryptographic functions and the specified message:

- Message m: "Alice owes Bob 100 AUD" (without the quotation marks)
- h(): SHA256
- E(): AES-128-CTR when symmetric, RSA when asymmetric
- || : Concatenation
KAB: Shared secret key between Alice and Bob for symmetric key algorithm with hex value
0123456789ABCDEF0123456789ABCDEF
IV : The Initialisation Vector for CTR algorithm with hex value
FFEEDDCCBBAA998877665544332211
- P UA: Public key of Alice (Alice.pub file)
- P RA: Private key of Alice (Alice.prv file)
- P UB: Public key of Bob (Bob.pub file)
- P RB: Private key of Bob (Bob.prv file)
Note: All of the key files are included in FIT2093-AssignmentFiles.zip (link provided in guidlines). The message is also included in the compressed file as plain.txt.

For each of the following protocols:
(a) Alice → Bob : m||h(m)
(b) Alice → Bob : E(P UB, m)
(c) Alice → Bob : m||E(P RA, h(m))
(d) Alice → Bob : E(KAB, m||h(m))
i) Specify whether each of the following security services are provided and explain why or why not:
- confidentiality;
- integrity;
- authenticity; and
- non-repudiation.
ii) Produce and report:
- the hex value of the protocol message;
- the commands used; and
- in case a security service is not provided, show with an example how an attack is performed.
[40 Marks]

2. Adam is using CFB mode of operation to encrypt a 256-byte file to send it to Beatrice.

1283_figure.jpg

Figure 1: s-bit Cipher Feedback Mode of Operation Using openssl show with example:

(a) If there is an error in transmitted ciphertext block C1, how many plaintext blocks will be corrupted when Beatrice decrypts the file for 8-bit CFB-DES?
(b) If there is an error in transmitted ciphertext block C1, how many corrupted plaintext blocks when 8-bit CFB-AES is used?
(c) If there is a change in source plaintext block P1, how many ciphertext blocks will be affected if 8-bit CFB-DES is used? How many blocks if 8-bit CFB-AES is used?
(d) If there is a change in source plaintext block P1, for both CFB-DES and CFB-AES explain the effect at reciever.
Note:
Use the provided sample file cfb.txt in assignment compressed file
FIT2093-AssignmentFiles.zip (the link is provided in guidlines page).
- For DES algorithm use FEDCBA9876543210 as the key and 0011223344556677 as the IV. For AES algorithm use FEDCBA9876543210FEDCBA9876543210 as the key and
00112233445566778899AABBCCDDEEFF as the IV.

3. Joe is an overworked and under-appreciated programmer at "This Secure World" company. He is asked to write an RSA key generation algorithm that performs better than the competition. To increase the efficiency of his algorithm he decides instead of generating two random prime factors for the modulus part of every RSA key pair, to reuse one of the previous factors and only generate one new random prime number for the new pair. For instance, RSA moduli (n values) generated by Joe's algorithm would be of the form::

n1 = p1 × q1

n2 = p2 × q1

n3 = p2 × q2

n4 = p3 q2
. . .
This has increased the efficiency of his algorithm by reducing the time required to test the primality of the randomly generated numbers and for the first time in quite a while he is praised by his supervisor for the surprisingly good performing algorithm. The company is going to embed this algorithm in all of their hardware and software products. You are tasked with evaluation of the security of Joe's approach by either approving or rejecting Joe's idea. You are given 20 public keys (modulus n) where some are generated using Joe's algorithm and others using a different algorithm. For all 20 samples, the value of e is 65537. Also, encryptions of 20 randomly generated plaintexts with respect to each public key are provided (c values in sample file).

If you accept Joe's idea, first clearly state it. Then, you must explain in detail why his method is secure and why the plaintexts cannot be recovered.

If you reject Joe's idea, first clearly state it. Then, you must demonstrate in detail how you can recover the plaintexts for keys generated using Joe's algorithm. Also, provide all the recovered plaintexts in decimal format (base 10).

Note:
- All numbers are represented in decimal (base 10).

*only task 3

Verified Expert

In this assignment we have studied data security.In this assignment we have studied RSA methodology for data security.In this assignment we have solve question on encryption message

Reference no: EM131998598

Questions Cloud

What is the current market value of your CD : If the market rate on the CD declines to 3.6% right after your purchase, what is the current market value of your CD?
Discuss the strategic marketing programs : Research suggests that a business is likely to achieve superior revenue growth, market share, and profitability when there is a good fit between.
Dominate the federal government wage law : A state's minimum wage law will dominate the federal government's wage law if the state's minimum wage is higher.
What are the dividends each year for the next four years : What are the dividends each year for the next four years? What is the share price in three years?
Write an RSA key generation algorithm : FIT2093 Introduction to Cyber Security - write an RSA key generation algorithm that performs better than the competition
Calculate gdp using the expenditure approach : Fill in the missing cells in the table to calculate GDP using the expenditure approach.
What will the forecast for next year earnings per share be : If the $35,943,750 needed for the project is raised by selling new shares, what will the forecast for next year’s earnings per share (EPS) be?
Create a pareto chart of the top states : Create a Pareto chart of the top 10 states with the largest number of households. Create a relative frequency distribution histogram for the "percentage.
Capital asset pricing model security market line : Calculate the required return on the stock using the Capital Asset Pricing Model (CAPM) Security Market Line. Please show your work.

Reviews

len1998598

5/28/2018 2:50:30 AM

You can use the sage web site, sage mathematical library, or any other multiple precision library to perform any calculation necessary for this assignment (https://sagecell.sagemath.org/). In questions related to modular arithmetic do not write the answers in scientific notation, you need to provide all of the digits for any requested parameter (similar to provided values). Try small examples (from lecture notes or other resources) to make sure you are using the proper format for the web site or library and the correct equation before trying the given values.

len1998598

5/28/2018 2:50:20 AM

Required Student Information: Please include the name and student id of all students in the group within the main PDF file. • Filename Format: A1 TutorialDay TutorialHour GroupNumber.pdf Late Submission Policy: Submit a special consideration form (available on moodle) to formally request a late submission. Late Submission Penalty: A late submitted assignment without prior permission will receive a late penalty of a 5% deduction per day (including Saturday and Sunday) or part thereof, after the due date and time. Marks • This assignment is worth 10% of the total unit marks. • The assignment is marked out of 100 nominal marks. 60 For example if you obtain 60 marks for this assignment, it will contribute 100 10 = 6 marks to your final unit grade. Answers to explanation questions will be graded based on the correctness and quality of the answer. Answers to computation questions will be graded based on the correctness of the result.

len1998598

5/28/2018 2:50:06 AM

Student Groups: Students should submit their report as a group of 3 students in their tutorial. Each group should choose one student as the submitter who will submit the assignment on behalf of the group. The names and student ids of all group members should be clearly stated in the report. If you want to work in a group of 2 you need to get approval from your tutor. Submission File Format: Only PDF file fromat is accepted. On various text editor software you can use ”Save as PDF” option or use free converters to convert your file to PDF. A handwritten submission is not acceptable. Note: Do not submit a compressed version of the PDF file or a compression of multiple files. Such submissions may risk losing partial or complete assignment marks.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd