Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1. Alice and Bob are sending a message m to each other

a) Give one method to achieve confidentiality for m.

b) Give one method to achieve integrity but NOT confidentiality for m

Question 2. Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw a diagram only to describe the message exchange and the content of each message.

Question 3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Show the entire mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Show the entire mathematical steps)

Question 4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Assume the encryption is absolutely unbreakable.

a) Can B be reasonably sure that the message is generated by A? Why?

b) If B shows another person C that B can use the key k to decrypt the message, can C be reasonably sure that the message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C can be reasonably sure that the message is indeed generated by A?

Question 5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following questions:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If the length of the key is doubled, what is the amount of time required to decrypt the message with brutal force? Why?

Question 6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts the cipher text and retransmits c1-c3-c3-c4, what will be the "plain text" blocks being decrypted into?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9132120

Have any Question?


Related Questions in Computer Engineering

Explain data information and knowledge with examples make

Explain data, information, and knowledge with examples. Make sure to clearly identify the differences between the terms.

Recall merge sort sorts a vector of elements rewrite merge

Recall Merge Sort sorts a vector of elements. Rewrite Merge Sort to sort a list of elements. You may use your own List or STL list. This must be in C++. Write your own version of merge_sort(), merge(), and copy() functio ...

Question a file is to be shared among different processes

Question : A file is to be shared among different processes, each of which has a unique id number and a priority level number. The file can be accessed simultaneously by several processes, subject to the following constr ...

Design a combinational circuit with three inputs a b and c

Design a combinational circuit with three inputs: A, B, and C, D and the output W. The output should be 1 only when the values of A, B interpreted as an unsigned integer (AB) is equal to the values of C, D interpreted as ...

Create a class named horse that contains data fields for

Create a class named Horse that contains data fields for the name, color, and birth year. Include get and set methods for these fields. Next, create a subclass named RaceHorse, which contains an additional field that hol ...

In mergers and acquisitions there is always a

In mergers and acquisitions there is always a pre-acquisition evaluation and post-acquisition evaluation of technology. Evaluation and control should be connected to each other. What should you know before and after the ...

Suppose pointers are 4 bytes long and keys are 12 bytes

Suppose pointers are 4 bytes long, and keys are 12 bytes long. How many keys and pointers will a block of 16,384 bytes have?

Consider the following reactionpcl 5 g -----gt pcl 3 g cl2

Consider the following reaction PCl 5 (g) -----> PCl 3 (g) + Cl2 (g) Kc = .0420 The concentrations of the products at equilibrium are [PCl3] = 0.120 M and [Cl2] = 0.160 M. What is the concentration of the reactant, PCl5, ...

Suppose that the demand curve for tickets to see a football

Suppose that the demand curve for tickets to see a football team play a game is given by Q = 80,000 - 40P and marginal cost is zero. The team's stadium can host 75,000 fans. i) How many tickets would the team sell if it ...

Question suppose that in the definition of an euler cycle

Question : Suppose that in the definition of an Euler cycle, we drop the seemingly superfluous requirement that the Euler cycle visit every vertex and require only that the cycle include every edge. Show that now the the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As