Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Automata & Computation Expert

Assume the following incidences happened years ago before there were agreements of cooperation between the US and the Cayman and Nevis Islands. So, neglect, the recent agreements between the US and the Cayman Islands government for your analysis.

Audrey changes banks following her troubles with FBT. At her new bank, Northern Security Trust (NST), RSA is used as the cryptographic system. Audrey creates a key pair and supplies to Faith, a manager of NST with her public key {eA, nA}, securing her private key {dA, nA} on a thumb drive which she keeps locked in a wall safe at her home. In turn, Faith, who is designated to handle Audrey's business, gave Audrey access to a key server maintained by NST so that she can readily obtain Faith's current public key {eF, nF} whenever she needs to communicate securely with Faith.

Things are fine for several months until Audrey sends Faith a message m asking about current interest rates on Certificates of Deposit issued by NST. As shown below, she encrypts the message with Faith's public key first and then signs with her private key.

C = (meF mod nF )dA mod nA

Where C is the encrypted message and m is the plaintext message.

A few days later, Audrey received a statement that shows a debit of $1,200,000 from her account. On inquiring, she was told that Faith transferred the money out of Audrey's account into an account of her own in a bank on the Caribbean island of Nevis, where she moved. When reached via long distance in Nevis, Faith produced a message 'g' from Audrey saying:

"Thanks for your excellent service, Faith. Please transfer $1,200,000 from my account to yours as a token of my esteem and appreciation. Signed, Audrey."

Audrey files suit against Faith, NST and the government of the Nevis, claiming that the message was a forgery sent by Faith herself, asking for triple damages for pain and suffering. Faith has responded by claiming that all procedures were followed properly and that Audrey is filing a nuisance suit.

You have been employed by NST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Audrey issue. You obtain Faith's private key from the UST server, and the cipher text C, and calculate g= (CeAmod nA)dFmod nF

Where g is the plain text message which was obtained the cipher text C, dF is Faith's Private key Your report to the NST Board of Directors should address the following issues:

From the facts as presented what can be determined about Audrey's intentions to make Faith a gift of $1,200,000? How did the fact help you in forming your conclusion?

What is the significance of Nevis Island? Did the significance sway your decision? If yes why? If no why?

What is the significance of Audrey's message to Faith asking for interest rates?

Assuming NST wishes to continue using RSA as its cryptographic system, what NST and Audrey could have done to protect against this controversy arising?

How to proceed in the litigation

Your report should clearly address these issues including the recommendation for Audrey's suit, RSA with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved. It should give direction to formulate plans for how to approach the immediate legal issue with Audrey, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and how it works

Automata & Computation, Computer Science

  • Category:- Automata & Computation
  • Reference No.:- M92773709
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Automata & Computation

Models of computation assignment -purpose - to improve and

Models of Computation Assignment - Purpose - To improve and consolidate your understanding of regular and context-free languages, finite-state and pushdown automata. To develop skills in analysis and formal reasoning abo ...

Solve the question given belowprove the following statement

Solve the question given below Prove the following statement using Hall's Theorem. For any bipartite graph G=(U, V, E), if every node (either a left node or a right node) has exactly d neighbors, where d is an arbitrary ...

Prove or disprove the following proposed inference rules

Prove or disprove the following proposed inference rules for functional dependencies. A proof should be made by using the reflexive, augmentation, transitive, decomposition, union, and pseudotransitive rules. A disproof ...

Question - design a task or function that will check the

Question - Design a task or function that will check the parity of a word for odd parity. The input to the task/function is a 5-bit word called data_in. If the parity of input data_in is not odd increment an error count ...

Regular expressions automatacomputabilitytheory of

Regular expressions, automata/computability/theory of computation How would I go about interpreting regular expressions? For example, how would I interpret the following in English: (0+1)*011 0*1*2* 0^(+)1^(+)2^(+)

Question 1hoare logic semantics for each of the parts below

Question 1 Hoare Logic Semantics For each of the parts below, justify your answer briefly. 1. For which programs S does {False} S {True} hold? 2. For which programs S does {True} S {False} hold? 3. For which programs S d ...

Models of computation assignment -purpose - to improve and

Models of Computation Assignment - Purpose - To improve and consolidate your understanding of regular and context-free languages, finite-state and pushdown automata. To develop skills in analysis and formal reasoning abo ...

Prove or disprove the following proposed inference rules

Prove or disprove the following proposed inference rules for functional dependencies. A proof should be made by using the reflexive, augmentation, transitive, decomposition, union, and pseudotransitive rules. A disproof ...

Question 1a digital computer has a memory unit with 16 bits

Question 1: A digital computer has a memory unit with 16 bits per word. The instruction set consists of 122 different operations. All instructions have an operation code part (opcode) and an address part (allowing for on ...

Iot and data analytics1 analyse the taskanalyse what is

IOT and data analytics 1. Analyse the Task Analyse what is expected of you. This includes careful reading of the assignment task as specified in the Subject Outline. The executive summary of the research project is to be ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As