Introduction to Networking s4

Introduction to Networking s4

<p> MSIT 458 Homework 1</p><p>Group Name: </p><p>1. Suppose that you are recommending usage of crypto standards to your CTO for the next generation of IT products in your company. The products aim for the market of the next five to ten years. For symmetric cipher, you will recommend ______, for asymmetric cipher, you will recommend ______, and for secure hash functions (a.k.a., message digest), you will recommend ______. </p><p>2. Based on your answers above, please fill in the table below to compare the three crypto mechanisms. Symmetric Asymmetric Message Digest Cipher Cipher Key length Block size (bits) Output size (given input size n=220 bits) Basic generic N/A structure</p><p>3. Message digest are reasonably fast, but here’s a much faster function to compute. Take your message, divide it into 128-bit chunks, and XOR all the chunks together to get a 128-bit result. Do the standard message digest on the result. Is this a good message digest function?</p><p>4. Assume a client machine authenticates a user to a remote server over a clear text channel. The following table refers to three authentication methods. Write yes/no in the following table cells. Vulnerable to Vulnerable to Client can change network sniffing dictionary attacks his secret in case of a compromise Plaintext passwords Plaintext N/A biometrics Challenge response Yes with user secret on smartcard</p><p>5. KPS problem 9-2</p><p>Page 1 of 2 6. Suppose we are using a three-message mutual authentication protocol, and Alice initiates contact with Bob. Suppose we wish Bob to be a stateless server, and therefore it is inconvenient to require him to remember the challenge he sent to Alice. R is the challenge, then is the following protocol secure? And why? Here Kbob is Bob’s secret key and Kalice-bob is the secrete key between Alice and Bob. Both are for symmetric ciphers. Assume that the crypto is safe that you cannot derive Kbob with R and Kbob(R ). </p><p>Alice Bob I am alice</p><p>R, K (R ) bob</p><p>K (R), K (R) bob alice-bob</p><p>Page 2 of 2</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us