ELEC8900_14_HW4-Solution_Oct19_2023 (1)
docx
keyboard_arrow_up
School
University of Windsor *
*We aren’t endorsed by this school
Course
8900
Subject
Electrical Engineering
Date
Dec 6, 2023
Type
docx
Pages
6
Uploaded by BrigadierRose8433
1
ELEC 8900-14
E
-C
OMMERCE
F
ALL
2023
A
SSIGNMENT
4 (
DUE
S
UNDAY
O
CT
29)
Problem 1.
Suppose you know that
3
6
≡
44
(
mod
137
)
,
3
10
≡
2
(
mod
137
)
.
Find a value
x
with
0
≤x ≤
136
such that
3
x
≡
11
(
mod
137
)
.
Taking the discrete log base 3:
6
Ind
3
3
≡
6
≡Ind
3
44
≡Ind
3
4
+
Ind
3
11
(
mod
136
)
20
≡Ind
3
4
→x
=
Ind
3
11
≡
(
6
−
20
)
mod
136
=−
14
mod
136
=
122
Problem
2.
Indicate false
(F)
or true
(T)
for each of the following statements.
No
justification is required, but if you think the statement is ambiguous, state your clarifying
assumptions and/or justification
.
1.
One difference between the fiduciary and scriptural money is that the
latter can be refused.
(T)
2.
If some bits of a “message” or “signature” is altered, the corresponding
hash
may not change.
(F)
3.
A symmetric encryption algorithm needs a pair of keys.
(F)
4.
A “digital certificate” may not prove that the public-private key pair
belonged to the claimed individual.
(T)
5.
A hash function can be used to prevent replay attack.
(T)
6.
Nonrepudiation means to prove the identity of the entity that tries to
access the destination’s resources.
(F)
7.
In the Key-Hashed Message Authentication Code (HMAC) a shared-
key is hashed with SHA and appended to plaintext before
transmission.
(T)
8.
ASN.1 is a programming language.
(F)
9.
The symmetric DES is a block cipher of 56-bit blocks which used a 64-
bit key for encryption/decryption.
(F)
10. The congruence
x
2
≡
1
(
mod p
)
has only two solutions if
p
is
prime.
(T)
ELEC8900-F2023
S. Erfani – ECE Dept.
University of Windsor
2
11.To support other MIBs in use in a network, the security MIB should
work in a manager/agent relationship.
(T)
12. Access control mechanisms can be managed through certificates
defined by IETF Recommendation X.509.
(F)
13. The elliptic curve cryptography provides strong security with small key
sizes.
(T)
14.The main idea behind asymmetric-key cryptography is the concept of
the trapdoor one-way function.
(T)
15.The number of points on the elliptic curve
y
2
≡ x
3
+
ax
+
b
(
mod p
)
along with the point at infinity is called the order of the curve.
(T)
16.ElGamal cryptosystem is based on the discrete factorization problem.
(F)
17. In ATM or Debit Card cryptography, the Pin Verification Value is
several digits selected from the encrypted data.
(T)
18.Verifying a digital signature does not prove that the public-private key
pair belonged to the claimed individual.
(T)
19. A certificate path is a sequence of certificates from one authority to
another.
(T)
20. Many e-commerce applications do not require verification of identity,
but only verification of authorization.
(T)
21.Double spending is easy to stop in online systems because a system
maintains record of serial numbers of spent coins.
(T)
22.In SET there is no need for the cardholder to authenticate merchants
with whom they can securely conduct transactions.
(F)
23.In SET, the payment gateway plays the role of a trusted third party,
without knowing the details of the transaction.
(T
24.
−
7
≡
18
(
mod
25
)
.
(T)
25. Deffie-Hellman scheme is mostly used for signing digital contracts.
(F)
26. A digital signature requires hashing and symmetric encryption.
(F)
27. AES is a symmetrical encryption algorithm.
(T)
28. Many e-commerce applications do not require verification of identity,
but only verification of authorization.
(T)
29.The primary models for mobile payment are mobile money, mobile
wallet, and mobile money transfer.
(T)
30. The OCF implements the integration of smart cards with computer
systems.
(T)
Problem 3.
Let us assume that Alice wants Bob to sign message
M
without disclosing
the content of
M
.
Describe the involved steps in this method mathematically (using the
concept of RSA algorithm and modular arithmetic).
ELEC8900-F2023
S. Erfani – ECE Dept.
University of Windsor
3
Alice can send a hash of message M, i.e., h(M) to bob for his
signing using his RSA private key.
Now, Alice can send the
concatenated message M||h(M) to any third party encrypted by the
recipient’s public key.
Problem 4.
Choose the correct answer.
Justify your choice, if needed.
[4.1]
The quantity
n
11
−
n
(
mod
11
)
, where
n
is an arbitrary integer,
a.
Could be divisible by 11.
b.
Is not always divisible by 11.
c.
Is always divisible by 11.
d.
May or may not be divisible by 11.
[4.2]
The most important services of a PKI are:
a.
Providing services to other protocols
b.
Certificates
c.
Storage and updates of keys
d.
Issuing, renewal, and revocation of keys
e.
Items
a, b
, and
c
f.
All of the above
[4.3]
A digital certificate contains
a.
A locally generated pseudorandom number
b.
Serial Number and Name of the certificate authority
c.
Public key of the holder and data on which hash and public-key
algorithms have been used
d.
Items b and c only
e.
Items a, b and c above
[4.4]
Alice received a digitally signed message from Bob. What
cryptographic key should he use to verify the digital signature?
a.
Alice’s public key
b.
Bob’s private key
c.
Bob’s public key
d.
Alice’s private key
e.
None of the above
[4.5]
What is the meaning of the following collection of cryptographic
entities? TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA
a.
Means the corresponding security system supports many
different ciphers.
b.
This is used in SET environment to provide security.
c.
This is an example of Handshake protocol.
d.
This defines a cipher suite for an SSL session.
e.
Record Protocol in SSL.
ELEC8900-F2023
S. Erfani – ECE Dept.
University of Windsor
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
[4.6]
The ASN.1 used to format X.509 certificates is:
a.
A programming language.
b.
Used as input to a compiler to use code.
c.
Used to describe only data structures.
d.
Items b and c only
e.
None of the above
[4.7]
What is the main difference(s) between SET and SSL?
a.
SSL is not secure against breaking of any one form of
encryption.
b.
SET is a payment protocol.
c.
SET requires all parties to have certificates.
d.
SSL is a secure message protocol, not a payment protocol.
e.
All
a, b
and
c
above
f.
Items
b, c
and
d
above
[4.8]
The 3-D Secure is a protocol used for online transactions that is:
a.
XML-Based and authenticate the user by requiring a certificate.
b.
XML-Based and authenticate the user by requiring to answer a
challenge in real-time.
c.
The protocol uses XML messages sent over SSL connections.
d.
All of the above
e.
Items
b
and
c
[4.9]
Some
script
properties are:
a.
Make no use of public-key cryptography.
b.
Represent a prepaid value
c.
Can be spent only once
d.
Can provide full anonymity
e.
All of the above
f.
Items
a
,
b
and
c
above
g.
Items
b, c
, and
d
above
[4.10]
The Components of an RFID tag system are tag, antenna, RFID
reader, and a computer.
The computer does:
a.
Powers the corresponding tag
b.
Sends the corresponding data to the tag
c.
Determines the required action
d.
Instructs the tag reader for the appropriate action
e.
Only Items
c
and
d
above
f.
All of the above
[4.11]
The ATM and debit cards cryptography use a PIN because:
a.
The PIN cannot be reverse-engineered
ELEC8900-F2023
S. Erfani – ECE Dept.
University of Windsor
5
b.
The PIN can be combine with other data to form a data block
c.
The PIN cannot be stored in plaintext
d.
The PIN can be used to generate the PIN verification value
(PVV)
e.
Only Items
a, b
and
c
f.
Only Items
a, c
, and
d
g.
All of the above
[4.12]
An smart card has the following structure:
a.
The I/O contacts, ROM, and CPU
b.
The I/O contacts, ROM, CPU, Processors
c.
The ROM, Processors, RAM, PROM, and EEPROM
d.
The I/O contacts, ROM, Processors, RAM, PROM
[4.13]
Which of the following attacks is not an active attack?
a.
Replay
b.
Masquerade
c.
Eavesdropping
d.
Denial of service
[4.14]
The 3-D Secure protocol uses ____ messages sent over _____
connections.
a.
Uses SET messages sent over SSL.
b.
Uses XML messages sent over SSL.
c.
Uses its own messages sent over SSL.
d.
Uses X.509 messages sent over TCP/IP.
e.
Uses various messages sent over TLS.
[4.15]
The main electronic purse issue(s) is (are):
a.
Removing money from the purse
b.
Getting money into the seller’s purse
c.
Charging the purse with money
d.
All of the above
e.
None of the above
[4.16]
The main objective of electronic commerce is
a.
To sale new products
b.
To improve on security of online shopping
c.
To expand the market for new services and virtual
goods
d.
To analyze the customer behavior
[4.17]
The dematerialized money is a form of
a.
Only digital purse
ELEC8900-F2023
S. Erfani – ECE Dept.
University of Windsor
6
b.
Virtual money, electronic money, digital money,
and digital purse
c.
Electronic money in digital purse
d.
Only virtual money in a digital purse
[4.18]
What is the OCF?
a.
It is a java-oriented integration of integrated-circuit cards with
computers.
b.
It is the open card framework implementation.
c.
It can handle several simultaneous requests for payment.
d.
It was introduced by a consortium, which included IBM and Sun
Microsystems.
[4.19]
Typical actors in a certified acquisition transaction are:
a.
Client, Merchant, Issuer, Acquirer
b.
Client, Merchant, Acquirer
c.
Client, Merchant, Issuer, Acquirer, Certificate Authority
d.
Client, Merchant, Issuer, Acquirer, Certificate
Authority, Payment Gateway
e.
None of the above is correct.
[4.20]
A SMIB is a data base
a.
For normal functioning of security management.
b.
That works in a manager/agent relationship.
c.
Has extended X.500 information base.
d.
“a” and “b” above
e.
“a” and “c” only
f.
“a” and “b” and “c” above
ELEC8900-F2023
S. Erfani – ECE Dept.
University of Windsor
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Related Questions
This is a practice problem from the Introduction to Electronics course in my Electrical Engineering program.
Could you please walk me through the steps of solving it so that I can solve more complicated ones in the future?
Thank you for your assistance.
arrow_forward
Don't know what these values are? What is H ? How can they add them?
arrow_forward
Convert the computed TEC into NEC.
THEVENIN'S EQUIVALENT CIRCUIT (TEC)
VTH
RTH
R3 (Load)
NORTON'S EQUIVALENT CIRCUIT (NEC)
IN
RN
R3 (Load)
arrow_forward
The manimum value of the altenating wotaye and curent are 400 U
and 20A respectvely s a cieritoanected to a svita supply .
The ristantanerus values of the veltnge and current are 283V and
10 A respectvely of fime t=0, beth icreasing pesitively.
4) Write dan the gapressom for vwltaga and curend at pmet.
b). Defermaned tha prver omsumed in the cranit.
Take the velye and cunent to be ginusrida).
fie P= VI end\
P = YI (PF)
arrow_forward
For the circuit shown, what is the Thevenin equivalent voltage, VT?
j2 n
ll
j4 N
ll
36445° V
-j5 N
O 31.05445.0° V
21.95Z11.5° V
21.9545.0° V
O 31.05/11.5° V
arrow_forward
Show all the work asap.
5. Determine I
arrow_forward
This was a part of a solution set given to me in bartleby. I wanted to know if my speculations of this being miswritten is correct. The red indicates what i think should be a 0 and the blue indlcates what i think should be 1. if i am wrong please let me know how to understand the kmaps better?
arrow_forward
I need the expert solution handwritten in full for the question, not an explanation.
arrow_forward
The solution is a paper without artificial intelligence please
arrow_forward
نقطتان )2(
Deduce the function of the
following circuit
VCC
15V
teinpring
R13
R4
SRB
2N3904
R6
1N4001GP
10uf
R2
10F
B0135
1N4001GP
lat
2N3904
L01
1N4001GP
10
45mVpk
LRI
R14
8.20
R11.
330
LRS
R9
10F
1300
150kO
R10
R12
B0135
Key-A
2200
100F
preamp circuit
VEE
15V
power amp elass AB circuit
Power amplifier O
UPS switching circuit O
DC motor driver O
Audio amplifier O
arrow_forward
Solve for Rc of Figure 42.
12 V
Ic
Rc
RB
VCE B=80
IB = 40 μA
Reference: Boylestad, R. & Nashehky, L. (2013).
Bectronic devices and circuit theory |11th ed.]. Upper
Saddle River, New Jersey: Pearson Education
Figure 42
1.5 k ohms
1.875 kohms
3.531 kohms
2.75 kohms
Vc=6V
arrow_forward
need help
arrow_forward
AAMA
1.constier the following T-resisteanca
a)Find the open circuit impadance paíamele(2)
4 Short s admittance
c) Hy bird parameter(h)e
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Delmar's Standard Textbook Of Electricity
Electrical Engineering
ISBN:9781337900348
Author:Stephen L. Herman
Publisher:Cengage Learning
Related Questions
- This is a practice problem from the Introduction to Electronics course in my Electrical Engineering program. Could you please walk me through the steps of solving it so that I can solve more complicated ones in the future? Thank you for your assistance.arrow_forwardDon't know what these values are? What is H ? How can they add them?arrow_forwardConvert the computed TEC into NEC. THEVENIN'S EQUIVALENT CIRCUIT (TEC) VTH RTH R3 (Load) NORTON'S EQUIVALENT CIRCUIT (NEC) IN RN R3 (Load)arrow_forward
- The manimum value of the altenating wotaye and curent are 400 U and 20A respectvely s a cieritoanected to a svita supply . The ristantanerus values of the veltnge and current are 283V and 10 A respectvely of fime t=0, beth icreasing pesitively. 4) Write dan the gapressom for vwltaga and curend at pmet. b). Defermaned tha prver omsumed in the cranit. Take the velye and cunent to be ginusrida). fie P= VI end\ P = YI (PF)arrow_forwardFor the circuit shown, what is the Thevenin equivalent voltage, VT? j2 n ll j4 N ll 36445° V -j5 N O 31.05445.0° V 21.95Z11.5° V 21.9545.0° V O 31.05/11.5° Varrow_forwardShow all the work asap. 5. Determine Iarrow_forward
- This was a part of a solution set given to me in bartleby. I wanted to know if my speculations of this being miswritten is correct. The red indicates what i think should be a 0 and the blue indlcates what i think should be 1. if i am wrong please let me know how to understand the kmaps better?arrow_forwardI need the expert solution handwritten in full for the question, not an explanation.arrow_forwardThe solution is a paper without artificial intelligence pleasearrow_forward
- نقطتان )2( Deduce the function of the following circuit VCC 15V teinpring R13 R4 SRB 2N3904 R6 1N4001GP 10uf R2 10F B0135 1N4001GP lat 2N3904 L01 1N4001GP 10 45mVpk LRI R14 8.20 R11. 330 LRS R9 10F 1300 150kO R10 R12 B0135 Key-A 2200 100F preamp circuit VEE 15V power amp elass AB circuit Power amplifier O UPS switching circuit O DC motor driver O Audio amplifier Oarrow_forwardSolve for Rc of Figure 42. 12 V Ic Rc RB VCE B=80 IB = 40 μA Reference: Boylestad, R. & Nashehky, L. (2013). Bectronic devices and circuit theory |11th ed.]. Upper Saddle River, New Jersey: Pearson Education Figure 42 1.5 k ohms 1.875 kohms 3.531 kohms 2.75 kohms Vc=6Varrow_forwardneed helparrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Delmar's Standard Textbook Of ElectricityElectrical EngineeringISBN:9781337900348Author:Stephen L. HermanPublisher:Cengage Learning

Delmar's Standard Textbook Of Electricity
Electrical Engineering
ISBN:9781337900348
Author:Stephen L. Herman
Publisher:Cengage Learning