Ask Question, Ask an Expert


Ask Computer Engineering Expert

1. Alice and Bob are sending a message m to each other

a) Give one method to attain confidentiality for m.

b) Give one method to attain integrity but NOT confidentiality for m

2. Computer B needs a user name and password for every login. User A requires to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw the diagram only to describe message exchange and content of each message.

3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Demonstrate the whole mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Demonstrate the entire mathematical steps)

4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Suppose the encryption is absolutely unbreakable.

a) Can B be reasonably sure that message is generated by A? Why?

b) If B shows another person C that B could use the key k to decrypt the message, could C be reasonably sure that message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C could be reasonably sure that the message is indeed generated by A?

5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following problems:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If length of the key is doubled, what is the amount of time needed to decrypt message with brutal force? Why?

6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts cipher text and retransmits c1-c3-c3-c4, what would be the “plain text” blocks being decrypted into? (Demonstrate all detail calculations)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91996

Have any Question? 

Related Questions in Computer Engineering

Abm and oop agent-based modeling shares many features with

ABM and OOP Agent-based modeling shares many features with object-oriented programming (OOP). In some ways ABM and OOP are very different from each other. OOP describes a class of potential programming languages, whereas ...

1 given a binary tree of size 76 what is the minimum number

1. Given a binary tree of size 76, what is the minimum number of levels it can contain? What is the maximum number of levels? 2. Draw all possible binary trees that contain 12 nodes.

1 explain the terms shallow copy and deep copy2 what access

1. Explain the terms shallow copy and deep copy. 2. What access attribute should instance variables have? What access attribute should static variables have? How about static final variables? 3. What access attribute sho ...

Implement a class quiz that implements the measurable

Implement a class Quiz that implements the Measurable interface. A quiz has a score and a letter grade (such as B+). Use the implementation of the DataSet class in Section 9.1 to process a collection of quizzes. Display ...

Zonealarm is a pc-based firewall and idps tool visit the

ZoneAlarm is a PC-based firewall and IDPS tool. Visit the product manufacturer at, and find the product specification for the IDPS features of ZoneAlarm. Which of the ZoneAlarm products offer these featu ...

In the sandpile model try coloring each patch based on how

In the Sandpile model, try coloring each patch based on how big the avalanche would be if you dropped another grain on it. To do this, make use of the push-n and pop-n procedures so that you can get back to the distribut ...

In the fourth lab we investigate smtp protocol in action we

In the fourth lab, we investigate SMTP protocol in action. We send an e-mail and, using Wireshark, we investigate the contents and the format of the SMTP packet exchanged between the client and the server. We check that ...

1 both acls and c-list entries use owners users rather than

1: Both ACLs and C-List entries use "owners" (users) rather than individual processes. Why? 2: Alice can read and write to the file x, can read the file y, and can execute the file z. Bob can read x, can read and write t ...

1 an organization is assigned the block 20001234142348 what

1. An organization is assigned the block 2000:1234:1423/48. What is the CIDR for the blocks in the first and second subnets in this organization? 2. Find the interface identifier if the physical address of the EUI is (F5 ...

Individual custom built computeryou have been tasked with

Individual: Custom Built Computer You have been tasked with building a custom desktop PC that will be used by Research and Development (R&D) programmers. They will use it to develop complex animations. The system will ne ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen