Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Alice and Bob are sending a message m to each other

a) Give one method to attain confidentiality for m.

b) Give one method to attain integrity but NOT confidentiality for m

2. Computer B needs a user name and password for every login. User A requires to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw the diagram only to describe message exchange and content of each message.

3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Demonstrate the whole mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Demonstrate the entire mathematical steps)

4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Suppose the encryption is absolutely unbreakable.

a) Can B be reasonably sure that message is generated by A? Why?

b) If B shows another person C that B could use the key k to decrypt the message, could C be reasonably sure that message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C could be reasonably sure that the message is indeed generated by A?

5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following problems:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If length of the key is doubled, what is the amount of time needed to decrypt message with brutal force? Why?

6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts cipher text and retransmits c1-c3-c3-c4, what would be the “plain text” blocks being decrypted into? (Demonstrate all detail calculations)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91996

Have any Question? 


Related Questions in Computer Engineering

1 how many invalid unused code sequences can we have in

1. How many invalid (unused) code sequences can we have in 5B/6B encoding? How many in 3B/4B encoding? 2. What is the result of scrambling the sequence 11100000000000 using each of the following scrambling techniques? As ...

1 add the operation getcodeseqsymbol to the morse code tree

1. Add the operation getCodeSeq(symbol) to the Morse Code Tree ADT, which accepts a single-character symbol and returns the corresponding Morse Code sequence for that symbol. None should be returned if the supplied symbo ...

1 write a deletion method for the redblack class that

1. Write a deletion method for the RedBlack class that adheres to the red-black rules. 2. Design and implement a program that compares AVL trees and red-black trees to skip lists. Which data structure performs the best?

1 use keplers law to check the accuracy of a given period

1. Use Kepler's law to check the accuracy of a given period and altitude for an Iridium satellite. 2. Use Kepler's law to check the accuracy of a given period and altitude for a Globalstar satellite. 3. Find the efficien ...

Modeling urban form we have discussed how the segregation

Modeling urban form We have discussed how the Segregation model is one approach to modeling urban form. There are many different ABMs that capture various aspects of the creation of urban patterns. In NetLogo, the Urban ...

Write a menu-driven program that uses your function from

Write a menu-driven program that uses your function from the previous question to extract the sales data and can produce any of the following reports: (a) Each of the four types of reports described in the chapter. (b) T ...

Identify ten validation tests and techniques used to

Identify ten validation tests and techniques used to enhance the validity of data input; be sure to give an example of each in your discussion. How are these tests handled? This assignment must be a neat, professional pr ...

Imagine a peer-to-peer network where 1000 users want to

Imagine a peer-to-peer network where 1000 users want to communicate in an authenticated and confidential way without a central Trusted Third Party (TTP). ] 1. How many keys are collectively needed, if symmetric algorithm ...

What factors should a firm consider when evaluating a move

What factors should a firm consider when evaluating a move from a client/server system to a cloud computing environment? Answer in about two paragraphs with reference. Must be 200-400 words and show an understanding and ...

Figure shows an interesting feature that generating torque

Figure shows an interesting feature that generating torque tends to increase with decreasing stator frequency. Describe why this trend is desirable for renewable energy conversion systems and what limits the actual perfo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro