COM3009 Computer Security : Symmetric Encryption Instead

$20 Bonus + 25% OFF

Securing Higher Grades Costing Your Pocket?
Book Your Assignment at The Lowest Price
Now!

Students Who Viewed This Also Studied

COM3009 Computer Security

Question

A. Decrypt y. Provide the decrypted plaintext. [20%]
(As the exercise states, this is textbook deterministic RSA, i.e., you encrypt numbers and decrypt numbers modulo n).
Explain your reasoning and method that you used to solve this question. You do not need to include your code, but you do need to explain your approach. 

B. 1. Some WEP-promotion campaign says that WEP encryption enforces a total of 40 + 24 = 64 bits security strength. What do you think about this statement? Justify your answer. [3%]
2. Explain how the receiver B uses K to extract the original message M upon receipt of (IV, C). [3%]
3. In some implementations, the 24-bit IV is assigned at random to each frame. Show that it leads to a serious security problem, when large amount of data are sent/received. Propose a better solution.
4. Now we examine another security issue of WEP. Assume that an adversary sitting in-themiddle between A and B has intercepted one frame of traffic data (IV, C) from A destined for B. Show that the adversary, who does not know K and does not bother to find K, can easily compute a valid C’ (C 0 6= C) such that he can send the modified data (IV, C0 ) to B without fear of detection.

How many different choices of such C 0 does he have?
Which property of cryptography is violated here?
What would you say security-wise about the fact that L is linear and used as it is in WEP?
Don’t forget that the attackers know the systems (which are considered to have public specs). I.e., the attacker here knows the lengths of inputs/outputs, etc. 

C. 1. Let j be the smallest index such that the jth bit of Ki is 1. In iteration i, we consider the values of X and Xˇ in step 3. Show that Xˇ = X ⊕ (1 − Xj )Ki [4%] ) we have to compare the bits in X and X0 , starting with the most significant ones. Think how to X and X0 compare bit by bit. At which position is there a first difference?]
2. In iteration i, let X and Xˇ be the values of these variables before step 4, and Xnew be the value of X after step Show that Xnew = X ⊕ (Li ◦ Xˇ)Ki . [4%]
3. Given that the procedure returns X, and X varies w.r.t. K as per point (b) above, it can be shown that EKL(X) is an affine cipher. This means that we have: EKL(X) = (M ×X)⊕c for some bit-matrix M, with × being multiplication of the bitmatrix with the bit-vector X, and c being some constant bitstring depending on KL.
Given this information, propose a way to break this symmetric encryption scheme.
Describe this way in words, i.e., no implementation is necessary. [7%]
[Hint: breaking the scheme means you should be able to decrypt some new ciphertext. I.e., this would be to recover X out of (M × X) ⊕ c for some X you do not already know.
What would you need in order to be able to do that? Can you get this thing you would need? If you can, then describe how and you are done.]

D.1. Why do we want to secure the session with symmetric encryption instead of asymmetric encryption? [2%]
2. Assuming that all the messages in the protocol given in Figure 1 are authenticated, explain why the subsequent connections are confidential and authenticated. [6%]
3. If the first connection is not authenticated, explain what an active adversary can do to break the intended security of this system as you understand it. [6%]
4. Why does the SSH client need to warn the user (i.e., the person using this SSH client), when the public key has changed? [4%]
5. Given the points above, why would you say that SSH is useful?

E. 1. Model the protocol Π in Scyther. Explain your modelling choices. How have you modelled the private channel between T and R ? Include the Scyther model (i.e. the .spdl file) as a separate file with your submission.
2. Check the following security goals in Scyther: – agreement on message m between S, R, and T; – synchronisation between S, R, and T;
Express these 3-party goals as best you can.
Explain your modelling and findings.
3. If you find any attack in the above, modify the protocol and check the modification does indeed stop the attack.
4. Apart from the results of the analysis you do in Scyther, do you think the protocol Π is an appropriate solution for the 3-party problem presented? Could you improve on it, from any viewpoint, security or otherwise? Explain your answer. 

COM3009 Computer Security

Answer in Detail


Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

19 More Pages to Come in This Document. Get access to the complete answer.

Throw away your coursework related worries into the sea when MyAssignmenthelp.com is here. Our brand is backed by 3000+ PhD expert writers to provide online assignment help for coursework. Our writers have graduated from prestigious international universities and have been providing assignment help services since the past several years. Students from UK, US and Australia can avail our academic assignment help especially when it is related to coursework. Our talented writers provide professional help regarding any type of coursework like custom essay writing, dissertation writing and so on. You can clear all your coursework related queries though our 24×7 online chat facility anytime. We provide plagiarism-free coursework and all sorts of assignment help material to students.

More COM3009 COM3009 Computer Security: Questions & Answers

COS10008 Foundations of Technical Programming

Questions:
Q 1.
A mobile manufacturing company pays its employees as follows:
Team leaders (fixed fortnightly salary)
Sales workers ($500 plus 6.5% of their gross fortnightly sales)
Pieceworkers (fixed amount of money per item for each of the items they produce, each piece worker in …

View Answer

Business Management

The topic to search about is : National Bank of Abu Dhabi follow the instructions in the project file 1 and project file 2. Please Please do the sam criteria.. Ad pictures, diagrams, appendix and tables as well as it is shown in the project files … and take a loo at the sample The topics that we w …

View Answer

H17X34 Programing and Logic

Question: Scenario A series of files have been sent to your program with different memory sizes. The sizes are all in whole numbers of Megabytes (MB) but the number of files are unknown. You have been asked to create a program that will find the file with the largest memory size. Your solution must …

View Answer

KV7002 Human Computer Interaction for Social Change

Question:
Relevant Programme-level
This assignment contributes to the following Programme-level
Demonstrate a comprehensive knowledge and critical understanding of essential facts, concepts, principles, theories, methods, techniques and tools in the application and management of a range of cu …

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the
content removal request.

Choose Our Best Expert to Help You

Carlos Hancock

Pursuing Master in Management with Specialization in Project Management

798 – Completed Orders

Hire Me

Aron Lane

I did my master’s in Geography from the University of London

300 – Completed Orders

Hire Me

Still in Two Minds? The Proof is in Numbers!

33845 Genuine Reviews With a Rating of 4.9/5.

English

Essay: 1.6 Pages, Deadline:
11 hours

I like how they help me. They are easy honest and always on time. I recommend them.

User ID: 8***35 United States

Civil Law

Home Work: 12 Pages, Deadline:
15 days

Thank you so much! It was a well-written and organized paper. Great job Thank you so much! Great job,Well written, but hoped for better grade, but i w …

User ID: 3***07 Cork, Ireland

Accounting

Assignment: 1400 Pages, Deadline:
8 days

It was very accurate. The research was done very well and I got nice marks . They really helped me with my work as I was struggling

User ID: 5***57 Sydney, Australia

Business Law

Assignment: 8 Pages, Deadline:
9 days

it was great assignment according to what was important, without mistakes, great

User ID: 8***11 Lincoln, Great Britain

Business Law

Assignment: 6.4 Pages, Deadline:
10 days

The assignment done by professional way and I got more than 85 marks for this subject. Thanks for the whole Nerddz team.

User ID: 2***65 Deepdene, Australia

Psychology

Assignment: 6.8 Pages, Deadline:
10 days

Great work done by the Team Nerddz. I got marks more than 85 for the subject. Thank you…

User ID: 2***65 Deepdene, Australia

Management

Assignment: 6 Pages, Deadline:
4 days

It was nice work and written in a good way. It helped me to increase my final grades for the same course and instructor praised me. Got good grades ov …

User ID: 5***29 Calgary, Canada

Economics

Assignment: 3.5 Pages, Deadline:
2 days

It was nice work and written in a good way. It helped me to increase my final grades for the same course and instructor praised me. 1 star less for im …

User ID: 5***29 Calgary, Canada

Management

Home Work: 3 Pages, Deadline:
1 day

This instructor was really very strict but still gave good marks. Abcdefghijklmno

User ID: 5***29 Calgary, Canada

Management

Thesis: 3 Pages, Deadline:
1 day

Amazing work on this! Got good marks excellent work by the writer. I did not expect so much marks

User ID: 5***29 Calgary, Canada

English

Essay: 1.6 Pages, Deadline:
11 hours

I like how they help me. They are easy honest and always on time. I recommend them.

User ID: 8***35 United States

Civil Law

Home Work: 12 Pages, Deadline:
15 days

Thank you so much! It was a well-written and organized paper. Great job Thank you so much! Great job,Well written, but hoped for better grade, but i w …

User ID: 3***07 Cork, Ireland

Accounting

Assignment: 1400 Pages, Deadline:
8 days

It was very accurate. The research was done very well and I got nice marks . They really helped me with my work as I was struggling

User ID: 5***57 Sydney, Australia

Business Law

Assignment: 8 Pages, Deadline:
9 days

it was great assignment according to what was important, without mistakes, great

User ID: 8***11 Lincoln, Great Britain

Business Law

Assignment: 6.4 Pages, Deadline:
10 days

The assignment done by professional way and I got more than 85 marks for this subject. Thanks for the whole Nerddz team.

User ID: 2***65 Deepdene, Australia

Psychology

Assignment: 6.8 Pages, Deadline:
10 days

Great work done by the Team Nerddz. I got marks more than 85 for the subject. Thank you…

User ID: 2***65 Deepdene, Australia

Management

Assignment: 6 Pages, Deadline:
4 days

It was nice work and written in a good way. It helped me to increase my final grades for the same course and instructor praised me. Got good grades ov …

User ID: 5***29 Calgary, Canada

Economics

Assignment: 3.5 Pages, Deadline:
2 days

It was nice work and written in a good way. It helped me to increase my final grades for the same course and instructor praised me. 1 star less for im …

User ID: 5***29 Calgary, Canada

Management

Home Work: 3 Pages, Deadline:
1 day

This instructor was really very strict but still gave good marks. Abcdefghijklmno

User ID: 5***29 Calgary, Canada

Management

Thesis: 3 Pages, Deadline:
1 day

Amazing work on this! Got good marks excellent work by the writer. I did not expect so much marks

User ID: 5***29 Calgary, Canada

Have any Query?

GET HELP WITH YOUR HOMEWORK PAPERS @ 25% OFF

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

Write My Paper Button

WeCreativez WhatsApp Support
We are here to answer your questions. Ask us anything!
👋 Hi, how can I help?
Scroll to Top