Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment

Short Paper #1

Description: The scenario description and requirements for Short Paper #1:

Prepare a short research paper of approximately 1300-1500 words, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end.

If you are unable to virus check your document, please submit as an rtf file rather than as a doc file. Please do not use macros in your document.

Be certain that your paper contains the required certification as specified in the syllabus.

I will submit your paper to Turnitin.com to ensure non-plagiarisation

Assume the following incidences happened five years ago so neglect recent agreements between the US and the Cayman Island government.

Scenario:

Angela, a high net worth customer, banks on-line at Trustworthy Bank and Trust (TBT) and has agreed to use 3DES (also known as Triple DES) in communicating with TBT. One day, Angela received a statement showing a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Jolene, transferred the money out of Angela's account and into an account of her own in an offshore bank in the Cayman Islands. When reached via long distance in the Cayman Islands, Jolene produced a message from Angela, properly encrypted with the agreed upon 3DES keys, saying:

"Thanks for your many years of fine service, Jolene. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation; Signed Angela.

Angela filed suit against Jolene, TBT and the government of the Cayman Islands, claiming that the message was a forgery, sent by Jolene herself and asking for triple damages for pain and suffering. TBT likes to file a counter suit against Angela, claiming that all procedures were followed properly and that Angela is filing a nuisance suit.

You have been employed by TBT as a cryptographic expert and consultant to investigate, give recommendations based on your findings including how to proceed with the suit and to produce a report for the TBT Board of Directors, which will provide basis for them in determining how to proceed in this matter.

Your report to the Board of Directors should address but not limited to the following issues:

• From the facts as presented, what can be determined about whether Angela intended to make Jolene a gift of $1,000,000? What are the critical points in determining intention of Angela? State your conclusion and how did the facts help you in forming your conclusion?

• What is the significance of Cayman Island? Did it affect your conclusion?

• Assuming TBT wishes to continue using only 3DES as its cryptographic system, what advice would you give to TBT and the customer or what could TBT and Angela have done to protect against this controversy arising?

• Would this controversy have arisen if TBT had been using AES rather than 3DES?

• What is a plausible explanation of what may have happened in this case?

Your report should clearly address these issues, with sufficient detail and background to allow the "cryptographically challenged" Board of Directors to understand the issues involved and recommendation to formulate plans for how to approach the immediate issue with Angela, and to continue business in the future, assuming that they want to continue using 3DES

Assuming TBT wishes to continue using 3DES as its cryptographic system, explain what TBT and Angela could have done to protect against this controversy arising

Short Paper #2

Description: The scenario description and requirements for Short Paper #2:

Prepare a short research paper of approximately 900-1000 words, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word attachment.

Be certain that your paper contains the required certification as specified in the syllabus.

I will submit your paper to Turnitin.com to ensure non-plagiarisation

Scenario:

Angela changes banks following her troubles with TBT. At her new bank, First Security Trust (FST), RSA is used as the cryptographic system. Angela creates a key pair and supplies to Felicity, an officer of FST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a thumb drive which he keeps locked in a wall safe at her home. In turn, Felicity gave Angela access to a key server maintained by FST so that she can readily obtain Felicity' current public key {eF, nF} whenever she needs to communicate securely with Felicity.

Things are fine for several months until Angela sends Felicity a message m asking about current interest rates on Certificates of Deposit issued by FST. As shown below, she enciphers the message first, and then signs it

C = (mef mod nf)dAmodnA

Where C is the encrypted message and m is the plaintext message.

A few days later, Angela received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Felicity transferred the money out of Angela's account into an account of her own in a bank on the Caribbean island of Nevis, where she moved. When reached via long distance in Nevis, Felicity produced a message 'g' from Angela saying:

"Thanks for your excellent service, Felicity. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Angela."

Angela files suit against Felicity, FST and the government of the Nevis, claiming that the message was a forgery sent by Felicity herself, asking for triple damages for pain and suffering. Felicity has responded by claiming that all procedures were followed properly and that Angela is filing a nuisance suit.

You have been employed by FST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Angela issue. You obtain Felicity's private key from the UST server, and the cipher text C, and calculate

g= (CeAmodnA)dFmodnf

Where g is the plain text message which was obtained the cipher text C

dF Is Felicity's Private key

Your report to the FST Board of Directors should address the following issues:

• From the facts as presented what can be determined about Angela's intentions to make Felicity a gift of $1,000,000? How did the fact help you in forming your conclusion?

• What is the significance of Nevis Island?

• What is the significance of Angela's message to Felicity asking for interest rates?

• Assuming FST wishes to continue using RSA as its cryptographic system, what UST and Angela could have done to protect against this controversy arising?

• How to proceed in the litigation

Your report should clearly address these issues including recommendation for the Angela's suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Angela, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works.

Attachment:- Short_Paper_Infa.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92273898
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Create a class named horse that contains data fields for

Create a class named Horse that contains data fields for the name, color, and birth year. Include get and set methods for these fields. Next, create a subclass named RaceHorse, which contains an additional field that hol ...

Question explain the difference between physical network

Question: Explain the difference between physical network segmentation and microsegmentation as they relate to cloud security. Explain what it means to implement a zero trust security strategy. Explain how microsegmentat ...

Describe how to discover cookies on web browsers what is a

Describe how to discover cookies on web browsers. what is a reverse DNS lookup and can it be used when attacking the network.

A researcher knows that the average distance commuting

A researcher knows that the average distance commuting students live from campus was previously 8.2 miles. Because of the rising prices of gasoline, the research wants to test the claim that commuting students now live c ...

Question suppose we have a hash table which has the hash

Question : Suppose we have a hash table which has the hash function integer % 13. For Quadratic and Linear Probing, what sequence of 13 different integers > 0 (positive) would create a worst-case situation over the entir ...

Question a signal was acquired at 200 hz and the spectrum

Question : A signal was acquired at 200 Hz and the spectrum showed a peak at 80 Hz. No anti- Max pts aliasing filter was used. Use the folding diagram to find the lowest 5 possible frequencies that the original signal ma ...

What statistic was calculated to determine differences

What statistic was calculated to determine differences between the intervention and control groups for the lumbar and femur neck BMDs? Were the groups significantly different for BMDs?

Savings account balance write a program that calculates the

Savings Account Balance Write a program that calculates the balance of a savings account at the end of a period of time. It should ask the user for the annual interest rate, the starting balance, and the number of months ...

What effect does the teacher have on creating a learning

What effect does the teacher have on creating a learning environment with little to no behavior problems?

Assignmenta in the slides and textbook one of the examples

Assignment (a) In the slides and textbook, one of the examples features a class for counting up. An interface which defines this functionality is given below: public interface IncrementCounter { //Increments the counter ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As