Question: Question 1 [ 1 3 ] a ) Timestamps and nonces are some of vital tools for network security.. i . Briefly explain a nonce
Question
a Timestamps and nonces are some of vital tools for network security..
i Briefly explain a nonce and its role in network security.
ii Under what circumstance would you prefer to use a nonce over a timestamp?
iii. Kerberos employs both nonces and timestamps. Explain why timestamps not only nonces required in Kerberos.
b Public announcements is one of ways in which public keys could be distributed.
i Give one weakness of this approach.
ii One improvement of the public announcement is the use of a publicly available directory.
Explain why directories as well do not quite work.
c Give and briefly explain any two applications of cryptographic hash functions. Also provide an
example cryptographic hash algorithm.
d With aid of a diagram, show how hash functions using public key cryptosystems can be used to
provide a digital signature.
Question
a Suppose Alice and Bob wish to do DiffieHellman key exchange. Alice and Bob have agreed upon a prime p and a generator mathrmg Alice has chosen her private exponent to be mathrma while Bob has chosen his private exponent to be b a
i Calculate all public key components for both Alice and Bob, as well as the final shared secret that DiffieHellman produces.
ii DiffieHellman is susceptible to maninthemiddle attack. Briefly explain how an adversary could instigate this attack. Also explain how this attagk could be thwarted.
b Using ElGamal cryptosystem, show the signature that Alice will send to Bob given; q a primitive root bmod mathrmq and private key exponent Also assume Alice selected K as and message hash mathrmm
c Suppose your RSA modulus is ntimes and your encryption exponent mathrme
i Find the decryption exponent d
ii Assuming that operatornamegcdn m Show that if c equiv mbmod is the ciphertext, then the plaintext is m equiv cdbmod
Question
a A simple key distribution scheme shown below in which PublicKey Encryption is used to establish a session key.
A
As
EPUb N IDA
A EPUb N
A
EPUb EPRa Ks
cqkbmod q
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
