Ask HR Management Expert

Case Study

While man-in-the-middle attacks are nothing new, several cryptography experts have recently demonstrated a weakness in the popular e-mail encryption program PGP. The experts worked with a graduate student to demonstrate an attack which enables an attacker to decode an encrypted mail message if the victim falls for a simple social-engineering ploy.

The attack would begin with an encrypted message sent by person A intended for person B, but instead the message is intercepted by person C. Person C then launches a chosen cipher text attack by sending a known encrypted message to person B.

If person B has his e-mail program set to automatically decrypt the message or decides to decrypt it anyway, he will see only a garbled message. If that person then adds a reply, and includes part of the garbled message, the attacker can then decipher the required key to decrypt the original message from person A.

The attack was tested against two of the more popular PGP implementations, PGP 2.6.2 and GnuPG, and was found to be 100% effective if file compression was not enabled. Both programs have the ability to compress data by default before encrypting it, which can thwart the attack.

A paper was published by Bruce Schneier, chief technology officer of Counterpane Internet Security Inc.; Johnathan Katz, an assistant professor of computer science at the University of Maryland; and Kahil Jallad, a graduate student working with Katz at the University of Maryland. It was hoped that the disclosure would prompt changes in the open-source software and commercial versions to enhance its ability to thwart attacks, and to educate users to look for chosen cipher text attacks in general.

PGP is the world's best known e-mail encryption software and has been afavorite since Phil Zimmermann first invented it in 1991; it has become the most widely used e-mail encryption software. While numerous attacks have rithm. With the power of computers growing exponentially, cracking this or even more modern algorithms is only a matter of time.

Group Project: PGP Case Study

Read the Case Study at the end of Chapter 4 of the textbook. With your group, determine at least four modifications to the Caesar Cipher encryption algorithm that could increase the time required to break it.

With PGP, Phil Zimmermann experienced resistance from the U.S. government before being allowed to distribute it. Do an Internet search to find additional information about Zimmermann's case. Then, in a 1- to 2-page group report, perform the following:

· Provide at least three reasons for this resistance.

· Provide references for each of the three reasons that justify the concerns of the government as legitimate.

· Identify the individual contributions of each member of the group.

Your report should be written in APA style.

Attachment:- case_study.rar

HR Management, Management Studies

  • Category:- HR Management
  • Reference No.:- M92236466
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in HR Management

Question 1select one diagnostic model ie 6-box 7s

Question: 1. Select one diagnostic model (i.e., 6-box, 7S, congruence, or one of the others) to apply to the chosen companies. Choose the model that you and your team feel best identifies and measures the relevant aspect ...

Question compose a three page paper not including the title

Question: Compose a three page paper (not including the title and reference pages). Your paper should be written in a scholarly third-person tone; it should be in APA format. Your essay should address the following: 1. E ...

Question discuss a specific time when you observed a

Question: Discuss a specific time when you observed a contradiction between: (a) the core values that your organization espouses and (b) the values reflected by the organization's policies or leaders' decisions or action ...

Question in reading chapter 3 we learned about multiple

Question: In reading Chapter 3, we learned about multiple theories including Equity Theory, Expectancy Theory, and Goal-Setting Theory. Of these three process motivation theories, select one and discuss and critique it. ...

Question part 1 think about how to build teams in terms of

Question: Part 1: Think about how to build teams in terms of designing the task, selecting the people, and then, managing their relationships. How would compose a team for completing a course/work project in terms of the ...

Question option 1 big data and swot analysisresearch a

Question: Option #1: Big Data and SWOT Analysis Research a minimum of four articles on big data, its usefulness in healthcare, and achieving the goal of improving patient outcomes. Do a SWOT (strengths, weaknesses, oppor ...

Question option 1 annotated bibliographycreate an annotated

Question: Option #1: Annotated Bibliography Create an annotated bibliography by evaluating three articles written in the last five years on patient safety and the quality of patient care. Provide a conclusion that demons ...

Question when considering the home care scenario in the

Question: When considering the Home Care scenario in the Allied Health Community, how would you identify the qualifying criteria to receive the potential $5 raise? What type of matrix would you build to apply raises? Wou ...

Question first part first review chapter 4 and consider the

Question: FIRST PART !!! First, review chapter 4 and consider the role of an HR professional as it pertains to recruitment. What are the most critical aspects that should be handled in order to ensure an effective recrui ...

Question need these two questions answeredusing your

Question: Need these two questions answered Using your knowledge of the stages of life and career development, explain how the career issues of a 27-year-old differ from those of a 45-year-old. What are the organizationa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As