Ask Computer Engineering Expert

Order the following four items to match with the process of digital signature generation and verification: (circle one)

1. Encrypt the digest with your private key.

2. Compare the message digest to one you created.

3. Generate a message digest.

4. Decrypt the signature with the sender's public key.

A. 4, 2, 1, 3
B. 1, 4, 3, 2
C. 3, 1, 4, 2
D. 3, 4, 2, 1

2. What is the purpose of including Message Authentication Code (MAC) with the message?

3. What is the difference between a MAC and a HMAC?

4. Who generates the authenticator in Kerberos and what is the purpose of the authenticator?

5. What primary problem does public-key cryptography solve?

6. Which of the following statements are true about Diffie-Hellman (D-H) key exchange?

A. The security of the scheme depends on it being difficult to solve ax = b mod n for a given b, n and x
B. The security of the scheme depends on it being difficult to solve ax = b mod n for x given a, b and n

7. Suppose a One-way hash function is used in a message exchanged between Alice and Bob.

A. Provide an example forgery scenario if the hash function lacks weak collision resistance property.

B. Provide an example forgery scenario if the hash function lacks strong collision resistance property.

8. A. Decrypt the following English cipher-text which has been produced by using substitution (Caeser) cipher:
kbkxeutk (Hint: Use the frequency distribution table of the letters of English language and the Vigenere Tableau given at the end of this script)

B. Consider a substitution cipher where 52 symbols were used instead of 26. In particular, each symbol in the cipher text is for either a lowercase English letter, or an uppercase English letter. For example, let E be the encryption function then we could have E(A) = T and E(a) = m. Such a modification augments the key space to 52! (52 factorial). Does this provide added security compared to a standard substitution cipher? Why or why not?

9. Suppose Alice wants to send a message to Bob containing her name N, her computers IP address IP, and a request R for Bob. Design encrypted messages that Alice must send to meet the security requirements below. Suppose that K-A and K-B are the private keys of Alice and Bob respectively.

Assume that Alice and Bob share a symmetric key K and have securely distributed their public keys K+A and K+B to each other. Assume that all the messages include Alice's name, IP address, and the request.

Recall the notation that x||y means the concatenation of x with y, {x}k denotes the encryption of x using key k, and that h(x) denotes a hash of x. Using the notation above, answer each question below using a message exchange diagram (like the ones we used in class), being specific about what is computed, what is transmitted, and who the sender and receiver of the message is.

A. Using the symmetric key, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

B. Using the symmetric key, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages
integrity and source.

C. Using public key cryptography, design a message that enables Bob to verify that the messages integrity has not been violated and that it is from Alice.

D. Using public key cryptography, design a message that protects the confidentiality of the request and ensures that Bob can verify the messages integrity and source.

10. A. Illustrate how Meet-in-the-Middle attacks can be devised with a double DES encryption scheme? How does 3DES protect against this attack.

B. Explain the self-healing property of cipher block chaining mode.

11. A. Perform encryption and decryption using the RSA algorithm where p = 3, q = 11, e = 7, and M = 5.

B. Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root g = 2.

i) If user A has public key Ya = 9. What is A's private key Xa?

ii) if user B has public key Yb = 3, what is the shared secret key K?

12. A. A system allows the user to choose a password with a length of one to five characters, inclusive. Assume that 10,000 passwords can be tested per second. The system administrators want to expire passwords once they have a probability of 0.10 of having been guessed. Determine the expected time to meet this probability under the condition that the password characters may be any number from 0 to 9.

B. Does using passwords with salts make attacking a single account more difficult than using passwords without salts? Explain why or why not.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92531446
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As