Question: Question 1 [ 1 3 ] a ) Timestamps and nonces are some of vital tools for network security.. i . Briefly explain a nonce

Question 1
[13]
a) Timestamps and nonces are some of vital tools for network security..
i. Briefly explain a nonce and its role in network security.
ii. Under what circumstance would you prefer to use a nonce over a timestamp?
iii. Kerberos employs both nonces and timestamps. Explain why timestamps (not only nonces)[2] required in Kerberos.
b) Public announcements is one of ways in which public keys could be distributed.
i. Give one weakness of this approach.
ii. One improvement of the public announcement is the use of a publicly available directory.
Explain why directories as well do not quite work.
c) Give and briefly explain any two applications of cryptographic hash functions. Also provide an
example cryptographic hash algorithm.
d) With aid of a diagram, show how hash functions (using public key cryptosystems) can be used to
provide a digital signature.
Question 2
[22]
a) Suppose Alice and Bob wish to do Diffie-Hellman key exchange. Alice and Bob have agreed upon a prime \( p=13\), and a generator \(\mathrm{g}=2\). Alice has chosen her private exponent to be \(\mathrm{a}=5\), while Bob has chosen his private exponent to be \( b=4 a \)
i. Calculate all public key components for both Alice and Bob, as well as the final (shared) secret that Diffie-Hellman produces.
ii. Diffie-Hellman is susceptible to man-in-the-middle attack. Briefly explain how an adversary could instigate this attack. Also explain how this attagk could be thwarted.
b) Using ElGamal cryptosystem, show the signature that Alice will send to Bob given; \( q=17\), a primitive root \(\bmod \mathrm{q}=7\), and private key exponent \(=11\). Also assume Alice selected K as 5 and message hash \(\mathrm{m}=12\).
c) Suppose your RSA modulus is \( n=5\times 11\) and your encryption exponent \(\mathrm{e}=3\)
i. Find the decryption exponent \( d \).
ii. Assuming that \(\operatorname{gcd}(n, m)=1\). Show that if \( c \equiv m^{3}(\bmod 55)\) is the ciphertext, then the plaintext is \( m \equiv c^{d}(\bmod 55)\)
Question 3
[17]
a) A simple key distribution scheme shown below in which Public-Key Encryption is used to establish a session key.
A
As-
-(1) E(PUb ,[N 1|| IDA ])
A.-(3) E(PUb, N2)
A
(4) E(PUb, E(PRa , Ks ))-
\( c_{1}=q^{k}\bmod q \)
Question 1 [ 1 3 ] a ) Timestamps and nonces are

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!