Computer Security Cryptographic Protocols & RSA Signature Algorithm HW

User Generated

djr55tbbq

Computer Science

Description

(1)Please complete exercise 14.1, 14.2, 14.6, 14.7 in the book P273-274(Dieter-Gollmann-Wiley.Computer.Security)

Exercise 14.1 Cryptographic protocols are intended to let agents communicate securely over an insecure network. Is this statement correct?

Exercise 14.2 Cryptography needs physical security. To what extent is this statement correct?

Exercise 14.6 Consider the RSA signature algorithm without a hash function, i.e. s=me mod n. Explain how, and to what extent, an attacker could forge signatures if there are no redundancy checks on the message m.

Exercise 14.7 When a document is too long to be processed directly by a digital signature algorithm, a hash of the document is computed and then signed. Which properties do you require from this hash function to prevent an attacker from forging signatures?

  • Distinguish between situations where the attacker only knows messages signed by the victim and situations where the attacker can choose messages the victim will sign.
  • Distinguish between selective forgeries, where the attacker has control over the content of the forged message, and existential forgeries, where the attacker has no control over the content of the forged message.
  • Consider the specific requirements of hash functions used with an invertible signature algorithm such as RSA.
  • (2)Please complete exercise 2 in chapter 10 in the book p563 (Management of Information Security 6th Edition by Michael E. Whitman)

    Exercise 2: Go to http://csrc.nist.gov. Under “Publications," select Special Publications, and then locate USP 800-34, Contingency Planning Guide for Information Technology Systems, June 2002." Download and review this document. Summarize the key points for an in -class discussion.

    (3)Please complete exercise 5 in chapter 11 in the book p616 (Management of Information Security 6th Edition by Michael E. Whitman)

    Exercise 5: Using the components of risk assessment documentation presented in the chapter, draft a tentative risk assessment of a lab, department, or office at your university.Outline the critical risks you found and discuss them with your class

    (4)Please complete exercise 1 in chapter 12 in the book p680 (Management of Information Security 6th Edition by Michael E. Whitman)

    Exercise 1: Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?

    (5)Using RSA(Rivest, Shamir&Adelman) encrypt and decrypt a given positive number, Q(Alphabet’s) 17th letter. Take {3, 13} as prime numbers. For a modulus calculator, use https://www.ti89.com/cryptotut/mod_arithmetic.htm.

    User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

    Explanation & Answer

    final copy, in case of any query please ask

    \
    Name
    Professor
    Course
    Date

    Question one
    Cryptographic protocols are intended to let agents communicate securely over an insecure (Or
    unprotected) network. Is this statement correct?
    This was the case in the past, where cryptography was only restricted to encryption of high
    profile files and secrecies, especially for functions of diplomatic services and high profile military
    activities. The depth of cryptography, nowadays has grown to be more comprehensive. For instance,
    cryptography is being used in establishing of secure frequencies of Internet payments, and for
    verifications purposes. Generally, this enable the supporting of integrity, however also in numerous
    aspects of concealment like encryption of the payload of packets.
    Cryptography needs physical security. To what extent is this statement correct?
    If secret keys are to be deployed, they have need to be protected; one may postpone these
    Problems through the use other keys of protection, nevertheless ultimately this chain ought to end.
    Where at this point, one has to depend on the physical security in protecting their secrecy of keys.
    Exercise 14.6 Consider the RSA signature algorithm without a hash function, i.e. s=me mod n. Explain
    how, and to what extent, an attacker could forge signatures if there are no redundancy checks on the
    message m.
    In some theoretical examination of "difficult" have the specified mathematical connotation,
    hence "not solvable within an asymptotic polynomial time". With this understandings its difficulty
    remain imperati...

    Similar Content

    Related Tags