Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Alice and Bob are sending a message m to each other

a) Give one method to attain confidentiality for m.

b) Give one method to attain integrity but NOT confidentiality for m

2. Computer B needs a user name and password for every login. User A requires to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw the diagram only to describe message exchange and content of each message.

3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Demonstrate the whole mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Demonstrate the entire mathematical steps)

4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Suppose the encryption is absolutely unbreakable.

a) Can B be reasonably sure that message is generated by A? Why?

b) If B shows another person C that B could use the key k to decrypt the message, could C be reasonably sure that message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C could be reasonably sure that the message is indeed generated by A?

5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following problems:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If length of the key is doubled, what is the amount of time needed to decrypt message with brutal force? Why?

6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts cipher text and retransmits c1-c3-c3-c4, what would be the “plain text” blocks being decrypted into? (Demonstrate all detail calculations)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91996

Have any Question? 


Related Questions in Computer Engineering

It is required to generate a histogram distribution for a

It is required to generate a histogram distribution for a set of daily average temperatures recorded in Antarctica. The temperatures are integer values in the range -40°C to +5°C. Design an algorithm to input n such temp ...

In a survey of couples in the us city of san francisco

In a survey of couples in the US city of San Francisco, Catania et al. [65] recorded, among other things, the ethnicity of their interviewees and calculated the fraction of couples whose members were from each possible p ...

Open the sandpile model from the chemistry and physics

Open the Sandpile model from the Chemistry and Physics section of the NetLogo models library. This model, originally developed by Bak, Teng, and Weisenfeld (1987), was the first model in which self-organizing criticality ...

A different approach to fast text searching is to step

A different approach to fast text searching is to step through the text in skips equal to the word length. As soon as we get a mismatch in trying to match the word sought we skip to the start of the next word. To do this ...

In a company all files which are sent on the network are

In a company, all files which are sent on the network are automatically encrypted by using AES-128 in CBC mode. A fixed key is used, and the IV is changed once per day. The network encryption is file-based, so that the I ...

1 what drawbacks to symmetric and asymmetric encryption are

1. What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie Hellman? 2. What is steganography, and what can it be used for? 3. Which security protocols are predominantly use ...

1 what type of security was dominant in the early years of

1. What type of security was dominant in the early years of computing? 2. What are the three components of the C.I.A. triangle? What are they used for? 3. If the C.I.A. triangle is incomplete, why is it so commonly used ...

An acknowledgment number in the go-back-n protocol defines

An acknowledgment number in the Go-Back-N protocol defines the next packet expected, but an acknowledgment number in the Selective-Repeat protocol defines the sequence number of the packet to be acknowledged. Can you exp ...

What are the benefits of web cache and list four of the

What are the benefits of web cache? and List four of the principles of the best use of cache?

The production planner for fine coffees inc produces two

The production planner for Fine Coffees, Inc., produces two coffee blends: American (A) and British (B). Two of his resources are constrained: Columbia beans, of which he can get at most 300 pounds (4,800 ounces) per wee ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro