Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Alice and Bob are sending a message m to each other

a) Give one method to attain confidentiality for m.

b) Give one method to attain integrity but NOT confidentiality for m

2. Computer B needs a user name and password for every login. User A requires to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw the diagram only to describe message exchange and content of each message.

3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Demonstrate the whole mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Demonstrate the entire mathematical steps)

4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Suppose the encryption is absolutely unbreakable.

a) Can B be reasonably sure that message is generated by A? Why?

b) If B shows another person C that B could use the key k to decrypt the message, could C be reasonably sure that message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C could be reasonably sure that the message is indeed generated by A?

5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following problems:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If length of the key is doubled, what is the amount of time needed to decrypt message with brutal force? Why?

6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts cipher text and retransmits c1-c3-c3-c4, what would be the “plain text” blocks being decrypted into? (Demonstrate all detail calculations)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91996

Have any Question? 


Related Questions in Computer Engineering

Please provide a one page executive summary on the blackout

Please provide a one page executive summary on the Blackout of 2003. Your summary should not exceed one single spaced page and should include Who, What, When, Where, Why and How the situation could have been handled or p ...

What is computer science and how would you apply it to

What is computer science and how would you apply it to mechanical engineering?

If the maximum effective bandwidth at which tcp is able to

If the maximum effective bandwidth at which TCP is able to transmit over a particular path is 1.5 Mbps, determine the wraparound time for the sequence number of the TCP.

Letter the names of the major components of the fi nal

Letter the names of the major components of the fi nal design in Problem 7.17. Problem 7.17: Evolve a design through three stages of refinement. First, generate 10 rough, ideation sketches, showing different design ideas ...

Explain your interest in studying sports management and

Explain your interest in studying Sports Management and what you expect to learn.

Can you use the qa strategies and techniques described in

Can you use the QA strategies and techniques described in this chapter to deal with other problems, not necessarily defect-related problems, such as usability, performance, modifiability? In addition, can you generalize ...

Why may a programmer choose to represent a data item in

Why may a programmer choose to represent a data item in IEEE 64-bit floating point format instead of IEEE 32-bit floating point format? What additional costs may be incurred at run time (when the application program exec ...

A 1000000 line of code program when printed at 50 lines per

A 1,000,000 line of code program, when printed at 50 lines per page, results in stack of paper about 10 feet high (3 meters). Show the calculation of this result. List any assumptions made.

When integrating diversity into workplace operations why

When integrating diversity into workplace operations, why should you monitor and review workplace processes to guide implementation?

Consider a system with memory mapping done on a page basis

Consider a system with memory mapping done on a page basis and using a single level page table. Assume that the necessary page table is always in memory. a. If a memory reference takes 200 ns, how long does a paged memor ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate