Discuss the trustworthiness of root certificates provided by browsers
Q: Suppose that you share a new (unused) random key of 128-bits with a recipient. You are considering…
A: For an n-bit block size are 2n possible different plaintext blocks and 2n possible different…
Q: A message authentication code, MAC, takes as input a key K and message M and outputs a tag T. In…
A: The answer is given in step 2.
Q: Alice wants to set up a business company that securely deals with her clients. Bob is a potential…
A: In this answer we will be discussing the relation with Asymmetric Encryption.
Q: PLEASE FILL OUT CHART Shared session key establishment using a Key Distribution Center (KDC).…
A: Answer :-
Q: What other protocol exchanges do you think might use both symmetric and asymmetric cryptography like…
A: Describe SSL/TLS protocol used in cryptography advantages of cryptography.
Q: Question 2 join an IPv6 host Bob wishes to join an S2 server, having only an IPv6 (and no IPv4)…
A: as given in question so explanation is given as according to the conditions explained in the…
Q: Design your network into two different network segments including LAN and WLAN, to suggest the…
A: 1. Being a basic retailer, the David Jones company has to market to many different audiences, in…
Q: Computer Science Before the introduction of IEEE 802.11i, the security scheme for IEEE 802.11 was…
A: IEEE 802.11i WIRELESS LAN SECURITY: There are two characteristics of a stressed out LAN that are not…
Q: Design a protocol based on a shared secret key to allow them to authenticate each other; • Explain…
A: I have answered this question in step 2.
Q: Alice wants to secretly send Bob a specific number. They can communicate only over a public…
A: Code:- #include<iostream> using namespace std; void A(char I); void B(char I); void match(char…
Q: Consider the following variants of the Needham-Schroeder Public-Key Protocol and identify the ones…
A: The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an…
Q: Suppose N people want to communicate with each of N – 1 other people using symmetric key encryption.…
A: Actually, Encryption is the conversion of data into a form, called a ciphertext, that cannot be…
Q: We have two users Hazem and Tamer, Hazem generates a random stream of bits using a random bit…
A: GIVEN: We have two users Hazem and Tamer, Hazem generates a random stream of bits using a random…
Q: Q: Alice wants to set up a business company that securely deals with her clients. Bob is a potential…
A: Deviated Encryption Privacy, vigorous verification, uprightness approval, and non-disavowal are…
Q: When transmitting data, 10 natural numbers (x1, x2, X10) are sent (0<xi s 10). At the Recipients…
A: Please upvote please. I am providing you the correct answer. Please upvote I need it badly. Let…
Q: Bob has received a message from Alice. The message is encrypted with Bob's public key (that Alice…
A: Since the message is encrypted with Bob's public key that Alice has obtained from a certification…
Q: /Questions on the Computer Network I Q1/ Assume you have the IP address 220.254.255.x / 28. Finish…
A: Introduction 1 . IP Address : 220.254.255.x/28 Address 220.254.255.0 1101 1100 . 1111 1110 .…
Q: For example, Computer A can communicate with computer C by using TELNET. At the same time, computer…
A: The main method is PCF Function.
Q: Secrecy Protocols Consider the following 4-message protocol: 1. A → S: (B, {(A, K1)}KpbS) 2. S → B:…
A: It is defined as forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of…
Q: Suppose KDC X serves one community of users and KDC Y serves a different community of users. KDC X…
A: Introduction: Given that: KDC serves the X and Y community of users KDC X shares a symmetric key…
Q: Group of answer choices Alice, the sender, has two messages m0 and m1; she knows exactly which one…
A: 1-2 oblivious transfer is a protocol in which sender sends some subset of n pieces of information to…
Q: Question: There are two different friends who want to send some informative data to each other. A…
A: about both :
Q: Shared session key establishment using a Key Distribution Center (KDC). Using the following table,…
A: Answer :
Q: Exercise 8. In the peap-based sniffer program shown in Listing 15.3 (Sec- tion 15.2.3), we replace…
A: Answer :-
Q: Shared session key establishment using a Key Distribution Center (KDC). Using the following table,…
A:
Q: In Bitcoin trading, a transaction is broadcasted to the decentralized network and each participant…
A: In Bitcoin trading, a transaction is broadcasted to the decentralized network and each participant…
Q: Why is it sometimes so hard to hide the occurrence and recovery from failures in a distributed…
A: The answer is given below.
Q: A number of companies have been invited to prepare and submit a tender for a contract using e-mail.…
A: Authentication steps :In computing, authentication is the process of verifying the identity of a…
Q: 1. Referring to Figure 15-1, which CAs must B/Y/Z/A/C trust in order to find a path to A/C/Y?
A: Explanation: Steps to reach the node: One can reach the node using following up-links or cross-link…
Q: To exchange a shared key using a symmetric cipher (called E), Alice and Bob are using the following…
A: To exchange a shared key using a symmetric cipher (called E), Alice and Bob are using the following…
Q: The BFT blockchain consensus protocol prevents integrity attacks by miners as long as _______.…
A: Answer : 1). Option: A :None of the above Reason:nearly 51% will be controlled by attacked by miner…
Q: Suppose that you receive a digital certificate that contains M and (h(M)]CA, where M = (Alice,…
A: Identifying the sender of certificate in a digital certificate The digital certificate contains M…
Q: Using a WiFi network, Foo wants to send a message securely to Alice. Discuss and describe a security…
A: According to our guideline we solve first one: ================================== In wifi ,This…
Q: Q1: Based on Kerberos protocol, find any mistakes i S wants to communicate with B, when A is the…
A: Falls under Computer networks. Kerberos authentication :It is currently the default…
Q: How can the encryption/decryption operation work if the tables are irreversible? (Justify the answer…
A: DES STRUCTURELet us concentrate on encryption; later we will discuss decryption. The encryption…
Q: Two Bank employers (Mr.(A) and Mr.(B)) created a Secure channel to transfer their bank credentials,…
A: Ans:) RSA encryption is modulo-based encryption. Given, For Mr A (sender): p = 11, q = 7, n = p*q…
Q: a) How can integrity and origin-authentication in messages sent between them be achieved while only…
A: Integrity - It means that the same message is received which was send, means there is no alteration…
Q: Q5. DHKE protocol Use these toy parameters to demonstrate how DHKE (Diffie-Hellman Key Exchange)…
A:
Q: Prior to the introduction of IEEE 802.11i, the security scheme for IEEE 802.11 was Wired Equivalent…
A: Given :- Prior to the introduction of IEEE 802.11i, the security scheme for IEEE 802.11 was Wired…
Q: (b) Critically compare, analyse and evaluate three authentication protocols including Needham-…
A: b. Symmetric key protocols that use a trusted third party (TTP) are by far themost numerous in the…
Q: TELNET, for example, allows Computer A to interact with Computer C. At the same time, computer A and…
A: Introduction: Telnet is a network protocol used to virtually access a computer and offer a two-way,…
Q: 1) Illustrate the MAC process. 2) According to the illustration in (1), explain in details each…
A: Symmetric key :Both sender and receiver share same key. Mac Algorithm : It is a symmetric key…
Q: Homework #2 Q1: A set of LANS are linked using bridges to create the bridged network depicted by the…
A: A) what is the initial configuration BPDU for B6? BPDU's main configuration contains id of root,…
Q: Mutation and Type-Flaw Attacks
A: Type flaw attack : It comes under security protocol. This is an attack where a field that was…
Q: When dealing with digital sign forgery. O False, in DSS it is impossible to achieve selective…
A: Actually, the answer has given below:
Q: Ahmed and one of his close friend, Ali, used to send e-mail using public and private key encryption.…
A: Question :- Why he might still want to use second method Answer :- in second method , encryption…
Q: Alice sends a message to Bob. The message is encrypted for confidentiality. Charlie "hacks" a router…
A: A replay attack is a threat to information. Usually, it is achieved by eavesdropping or installing…
- Discuss the trustworthiness of root certificates provided by browsers
- We have two users Hazem and Tamer, Hazem generates a random stream of bits using a random bit generator software and XORs bits with his key then send the results bits to Tamer over the network. Tamer XORs the received bits with his key (which suppose the same as Hazem’s key) and reply to Hazem with the results bits. Hazem compares the received bits from tamer with the original random bits. the comparison process to check whether the keys at the two sites are the same.as you noted in the previous protocol no keys are exchanged over network between Hazem and Tamer
- prove with details the steps that the values of the keys are the same at both users
- show by steps how can the opponent attack this schema to know the shared secret key
Step by step
Solved in 2 steps
- Alice wants to set up a business company that securely deals with her clients. Bob is a potential client that Alice wants to have a good connection. As a security consultant, your job is to devise a plan to establish a secure information exchange. The assumption is made that Alice and Bob already have their public and public keys; (PrivA, PubA) and (PrivB, PubB) respectively, and both of them have exchanged their public key beforehand. Your plan includes comprehensive protocols to secure all messages, according to Alice’s requirements below. Discuss your answers. i) Integrity: Alice and Bob want to make sure that every message sent cannot be forged by anyone. ii) Authenticity: Alice and Bob can verify that messages actually came from them iii) Confidentiality: Alice exchanges business-related documents with Bob in a way, so that Alice and Bob may open, read or modify the documents.Alice wants to set up a business company that securely deals with her clients. Bob is a potential client that Alice wants to have a good connection. As a security consultant, your job is to devise a plan to establish a secure information exchange. The assumption is made that Alice and Bob already have their public and public keys; (PrivA, PubA) and (PrivB, PubB) respectively, and both of them have exchanged their public key beforehand. Your plan includes comprehensive protocols to secure all messages, according to Alice’s requirements below. Discuss following 3 in relation with Asymmetric Encryption . i) Integrity: Alice and Bob want to make sure that every message sent cannot be forged by anyone. ii) Authenticity: Alice and Bob can verify that messages actually came from iii) Confidentiality: Alice exchanges business-related documents with Bob in a way, so that Alice and Bob may open, read or modify the documents.*****Please use the information provided in this question!***** Shared session key establishment using a Key Distribution Center (KDC). Using the following table, illustrate how Alice can initiate a secure session with Bob with the help of KDC. Here, KEKs are the long term key establishment keys used to transport the session keys across the network securely. Assume the encryption process to be as follows: Divide the key into two halves: LK and RK; Divide the plaintext into two halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT; where LC, RC, LT, and RT are each 4 bits; Plaintext and ciphertext are each 8 bits. For example, if plaintext=A7 (Hexa) and Key = 6D; then LC=6 ⊕ 7 = 0110 ⊕ 0111 = 0001 = 1 (Hexa); and RC = D ⊕ A = 1101 ⊕ 1010 = 0111 = 7 (Hexa); so Ciphertext = 17 (Hexa). To decryptt, it does the reverse operation: Given ciphertext of C=LC||RC, it finds plaintext T=LT||RT, by finding LT=RC ⊕ RK and RT = LC ⊕ LK. In the above example, LT = 7 ⊕D…
- Alice receives an email, apparently signed using a PGP private key by Bob. she does not know Bob’s public key, but she knows and has signed the public keys of Carol and -Dave. Dave has signed the keys of Alice, Bob and Eve. Eve has signed Carols and Dave’s keys. Alice has “complete trust” in Dave, and “part trust” in carol and Eve. Should Alice accept the signature on Bob’s email? Explain your answer, specifying any assumptions you make about PGP.*****Please use the information provided in this question!***** ***Only do C, please!*** Shared session key establishment using a Key Distribution Center (KDC). Using the following table, illustrate how Alice can initiate a secure session with Bob with the help of KDC. Here, KEKs are the long term key establishment keys used to transport the session keys across the network securely. Assume the encryption process to be as follows: Divide the key into two halves: LK and RK; Divide the plaintext into two halves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT; where LC, RC, LT, and RT are each 4 bits; Plaintext and ciphertext are each 8 bits. For example, if plaintext=A7 (Hexa) and Key = 6D; then LC=6 ⊕ 7 = 0110 ⊕ 0111 = 0001 = 1 (Hexa); and RC = D ⊕ A = 1101 ⊕ 1010 = 0111 = 7 (Hexa); so Ciphertext = 17 (Hexa). To decryptt, it does the reverse operation: Given ciphertext of C=LC||RC, it finds plaintext T=LT||RT, by finding LT=RC ⊕ RK and RT = LC ⊕ LK. In the…must answered ALL parts for upvote, as per chegg guidelines, up to four subparts may be answered: - what are two desirable properties of IV in network security? - a cryptographic hash function is used to provide confidentiality and integrity of a message, true or false? - when AES is used with the CBC mode, the size of an IV is 256 bit long, true or false?
- Use the test below and write conclusion for in 200 words LLMNR Poisoning and SMB Relay Attacks. The Linked Local Multicast Name Resolution (LLMNR) is a technique used to identify a system when DNS fails to do so on local network. It sends out a multicast message to all systems listening on the local network and waits for a response. This tool utilizes username and NTLMv2 hash for verification of credentials. It’s an internal attack where impersonator can intercept and act as that host then gain usernames and hashes and crack weak passwords to utilize it for their exploits. Server Message Block (SMB) is used for sharing access to files, printers, serial ports, and other resources on a network. It was mainly used for Windows, however Linux and macOS also have components for connecting to SMB resources. In SMB relay attack, attackers capture valid authentication session and then relay it thereby obtaining access. Instead of cracking the hashes, attackers can relay these hashes for…Is the network traffic traversing the IPSEC VPN encrypted using symmetric or asymmetric encryption? Explain the difference between these 2 methods. Compare 3 algorithms that could be used to encrypt the IPSEC VPN traffic. List the tests you will perform to verify that your security measures and VPN are functioning as expected. Ref:JNAA-JSEC-12.a_IG Chapter 7Which of the following statements about Anonymity is CORRECT: A. Bitcoin is anonymous as it doesn't use any name at all. B. In the Bitcoin network, you can only create a limited number of addresses. C. Unlinkability means that if a user interacts with the system repeatedly, these different interactions should not be able to be tied to each other from the point of view of the adversary. D. The anonymity set of your transaction is the set of transactions without real identities.
- This is one question Discuss how the asymmetric encryption algorithm can be used to achieve the following goals with the use of the following technical term abbreviations: pubKS—public-key-for-the-sender;pubKR—public-key-for-the-receiver;priKS—private-key-for-t -sender;priKR—private-key-for-the-receiver. .---you must use these term abbreviations, rather than their complete/long phrases in your solutions! 1.Authentication: the receiver knows that only the sender could have generated the message. 2.Secrecy: only the receiver can decrypt the message. 3.Authentication and secrecy: only the receiver can decrypt the message, and the receiver knows that only the sender could have generated the message.Using your full name ABDULAI as the keyword in the application of Playfair cipher, perform an encryption of the following plaintext – THIS SEMEESTER IS A A VERY WONDERFUL SEMESTER INDEED AND IIT HAS ENDED VERY WELL. 2.Describe the functions of the various components found in the general model for securing a network“Suppose you want to visit a controversial web site (for example, a political activist site) and you (1) don’t want to reveal your IP address to the Web site, (2) don’t want your local ISP (which may be your home or office ISP) to know that you are visiting the site, and (3) you don’t want your local ISP to see the data you are exchanging with the site. If you use the traditional approach of connecting directly to the Web site without any encryption, you fail on all three counts. Even if you use SSL, you fail on the first two counts: Your source IP address is presented to the web site in every datagram you send; and the destination address of every packet you send can easily be sniffed by your local ISP. To obtain privacy and anonymity, you can instead use a combination of a trusted proxy server and SSL. With this approach, you first make an SSL connection to the trusted proxy. You then send, into this SSL connection, an HTTP request for a page at the desired site. When the proxy…