Description
(1)Please complete exercise 14.1, 14.2, 14.6, 14.7 in the book P273-274(Dieter-Gollmann-Wiley.Computer.Security)
Exercise 14.1 Cryptographic protocols are intended to let agents communicate securely over an insecure network. Is this statement correct?
Exercise 14.2 Cryptography needs physical security. To what extent is this statement correct?
Exercise 14.6 Consider the RSA signature algorithm without a hash function, i.e. s=me mod n. Explain how, and to what extent, an attacker could forge signatures if there are no redundancy checks on the message m.
Exercise 14.7 When a document is too long to be processed directly by a digital signature algorithm, a hash of the document is computed and then signed. Which properties do you require from this hash function to prevent an attacker from forging signatures?
(2)Please complete exercise 2 in chapter 10 in the book p563 (Management of Information Security 6th Edition by Michael E. Whitman)
Exercise 2: Go to http://csrc.nist.gov. Under “Publications," select Special Publications, and then locate USP 800-34, Contingency Planning Guide for Information Technology Systems, June 2002." Download and review this document. Summarize the key points for an in -class discussion.
(3)Please complete exercise 5 in chapter 11 in the book p616 (Management of Information Security 6th Edition by Michael E. Whitman)
Exercise 5: Using the components of risk assessment documentation presented in the chapter, draft a tentative risk assessment of a lab, department, or office at your university.Outline the critical risks you found and discuss them with your class
(4)Please complete exercise 1 in chapter 12 in the book p680 (Management of Information Security 6th Edition by Michael E. Whitman)
Exercise 1: Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?
(5)Using RSA(Rivest, Shamir&Adelman) encrypt and decrypt a given positive number, Q(Alphabet’s) 17th letter. Take {3, 13} as prime numbers. For a modulus calculator, use https://www.ti89.com/cryptotut/mod_arithmetic.htm.

Explanation & Answer

final copy, in case of any query please ask
\
Name
Professor
Course
Date
Question one
Cryptographic protocols are intended to let agents communicate securely over an insecure (Or
unprotected) network. Is this statement correct?
This was the case in the past, where cryptography was only restricted to encryption of high
profile files and secrecies, especially for functions of diplomatic services and high profile military
activities. The depth of cryptography, nowadays has grown to be more comprehensive. For instance,
cryptography is being used in establishing of secure frequencies of Internet payments, and for
verifications purposes. Generally, this enable the supporting of integrity, however also in numerous
aspects of concealment like encryption of the payload of packets.
Cryptography needs physical security. To what extent is this statement correct?
If secret keys are to be deployed, they have need to be protected; one may postpone these
Problems through the use other keys of protection, nevertheless ultimately this chain ought to end.
Where at this point, one has to depend on the physical security in protecting their secrecy of keys.
Exercise 14.6 Consider the RSA signature algorithm without a hash function, i.e. s=me mod n. Explain
how, and to what extent, an attacker could forge signatures if there are no redundancy checks on the
message m.
In some theoretical examination of "difficult" have the specified mathematical connotation,
hence "not solvable within an asymptotic polynomial time". With this understandings its difficulty
remain imperati...
