Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1. Alice and Bob are sending a message m to each other

a) Give one method to achieve confidentiality for m.

b) Give one method to achieve integrity but NOT confidentiality for m

Question 2. Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution is to send in the user name and the password in clear text.

a) What is the security vulnerability of this solution?

b) Design a better solution. Draw a diagram only to describe the message exchange and the content of each message.

Question 3. A stream cipher is used to encrypt. The plain text m1 is 10101010, the pseudo random k is: 01101011

a) What is the cipher text c1? (Show the entire mathematical steps)

b) If another plain text m2 11100010 is encrypted with the same pseudo random number k andgenerate cipher text c2, what useful information about m1 and m2 can you extract from c1 and c2? (Show the entire mathematical steps)

Question 4. B receives a financial transaction request message m from someone claims to be A. The message is encrypted with a shared security key k which only A and B know. Assume the encryption is absolutely unbreakable.

a) Can B be reasonably sure that the message is generated by A? Why?

b) If B shows another person C that B can use the key k to decrypt the message, can C be reasonably sure that the message is generated by A? Whey?

c) Design a different protocol so that when B receives a message m from the real A, both B and C can be reasonably sure that the message is indeed generated by A?

Question 5. If the time to encrypt a message m using a 64-bit secret key k algorithm is T, use the big-O notation to answer the following questions:

a) How to decrypt the message with brutal force? What is the amount of time required?

b) If the length of the key is doubled, what is the amount of time required to decrypt the message with brutal force? Why?

Question 6. With CBC encryption, message blocks m1-m2-m3-m4 are encrypted into c1-c2-c3-c4. Now if a hacker intercepts the cipher text and retransmits c1-c3-c3-c4, what will be the "plain text" blocks being decrypted into?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9132120

Have any Question?


Related Questions in Computer Engineering

What are the overall cost leadership differentiation and

What are the overall cost leadership, differentiation, and focus strategies?

Looping structures can be very helpful when coding an

Looping structures can be very helpful when coding an application. These are designed for iterative statements that need to happen multiple times. There are several looping structures you can utilize in C++, For, While a ...

We are evaluating a project that costsnbsp1140000 has a

We are evaluating a project that costs $1,140,000, has a ten-year life, and has no salvage value. Assume that depreciation is straight-line to zero over the life of the project. Sales are projected at 51,000 units per ye ...

What is the broadcast domain and ports for hubs and

What is the Broadcast Domain and Ports for hubs and bridges?

A restaurant offers a 12 dinner special that has 7 choices

A restaurant offers a? $12 dinner special that has 7 choices for an? appetizer, 13 choices for an? entrée, and 4 choices for a dessert. How many different meals are available when you select an? appetizer, an? entrée, an ...

Question suppose we perform a sequence of n operations on a

Question : Suppose we perform a sequence of n operations on a data structure in which teh ith operation costs i 2 of i is an exact power of 2 and 1 otherwise. Use aggregrate analasys and accounting method to determine th ...

Question suppose you want to achieve a speedup of 90 times

Question : Suppose you want to achieve a speedup of 90 times faster with 100 processors. What percentage of the original computation can be sequential? Assume one byte data value is 1101, 1000(binary). When we decode the ...

Summarizes the results of a risk assessment for business

Summarizes the results of a risk assessment for Business Continuity Risk. Determine the steps that can be taken to mitigate Business Continuity risks. What's identified should be cost-effective based on the overall risk ...

Annual demand and supply for the mylan company is given

Annual demand and supply for the Mylan company is given by: QD = 5,000 + 0.5 I + 0.2 A - 100P, and QS = -5000 + 100P where Q is the quantity per year, P is price, I is income per household, and A is advertising expenditu ...

There are sorted sequences l1 and l2 with 5 and 4 elements

There are sorted sequences L1 and L2, with 5 and 4 elements respectively. a) How many comparisons will it take to merge L1 and L2 in the best case? How many for worst case? Explain your answers. b)Let [54, 26, 93, 17, 77 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As