Sep 26th, 2015
Sigchi4life
Category:
Computer Science
Price: \$25 USD

Question description

Uses of Secret Key Cryptology

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret (Alice authenticates to either Bob or Carol by proving knowledge of KA, Bob with KB, and Carol with KC).

Assume a cryptographic algorithm that is linear in the length of the key to perform "good guy operations," e.g., encryption, decryption, key generation, integrity check generation, and integrity check verification; and that it is exponential in the length of the key to perform "bad guy operations," e.g., brute force breaking.

In a well-crafted document, fully discuss the following items. Provide details and justifications for each item. This should be a 4- to 6-page Microsoft Word document. Cite your sources, wherever required.

1. Advances in computation make computers an order of magnitude faster. Does this work to the advantage of the good guys, the bad guys, or neither? Justify your answer with reasoning.
2. Assuming a very large message and public keys user, describe what information would need to be included in each of the following:
• Bob sending an unencrypted, signed message to Alice.
• Bob sending an unencrypted, signed message to multiple recipients (Alice and Carol).
• Bob sending an encrypted, signed message to Alice.
• Bob sending an encrypted, signed message to Alice and Carol.
• Explain efficiency issues and alternate methods that would work but be less efficient.

Analyze whether it will be easier to have nonrepudiation with the use of public or private user keys. How about plausible deniability?

Cite any sources in APA format.

(Top Tutor) Daniel C.
(997)
School: UC Berkeley

Studypool has helped 1,244,100 students

## Review from our student for this Answer

Sigchi4life
Sep 29th, 2015
"Top quality work from this guy! I'll be back!"

1830 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors