Question
please answer fast and neatly . please make sure its right
1 Hash (10 pts) m Alice Bob t = CRC(m) Attacker Y or N = V(m,t) 1. Describe the security vulnerability of the system prov
2. What is the solution for the problem found in Problem 1? (3 pts)
3. One example of the solution that was found in Problem 2 is Hash Message Authentication Code (MAC). Describe the operatio
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1Q) Describe the Security vulnerabilities of the system

Ans) In the cyber Security, a Vulnerability is the weakness that can be exploited by an attack to gain unauthorized access in order to perform unauthorized intrution on the system. Vulnerabilities can allow the attackers to run the code, access the memory of the system, inject the malware, destroy the system by unwanted data incorporation and steal the data or modify the sensitive data. In order to exploit a vulnerability the attacker has to follow few varieties of methods which include opensource exploit which are known vulnerabilitiesbuffer overflow, SQL injection, cross-site scripting, in the web applications vulnerabilities,and also format string vulnerabilities.

Hash function Vulnerability Index and Hash Chain Attack are the attacks are constructed by repeated hashing which becomes threats to the hash function and collition freee properties. It also finds applications for network protocol design

Approaches to the Message Authentication requirements when the following attacks are identified across the network are as follows: 1) Disclosure 2) Traffic Analysis 3) Masquerade 4) Content Modification 5) Sequence Modification 6) Timing Modification 7) Source Repudiation 8) Destination repudiation

2Q) What is the solution for the problem found.

Ans) The solution for these type of problems are Message Authentication. Which includes the a) some sort of functions which is used to authenticate the message and b) the protocol is used which enables a receiver to check the authenticate the message..

In order to produce an authentication we have

(i) Message Encryption (ii) Message Authentication Code (MAC) (iii) Hash function

1) Message Encryption: The plain text(message) is converted into cipher text(encrypted form), where in which there are a) Symmetric Encryption and b) Asymmetric Encryption

A MAC(message authentication code) is also know as cryptographic check sum, generated by a fucntion C of

Model for symmetric Encryption:

MAC = Ck(M), where M is th emessage, k is the secret key and Ck(M) is the fixed length authenticator.

Public Key Encryption is b bits Plaintext Key (K) Encryption algorithm Ciphertext b bits

Public key encryption provides confidentiality but not authentication, why because any opponent can use the public key to encrypt the message.

If the Privater key is used by the Sender to enccrypt the message the receiver uses the public key to decrypt then it is Private Key Encryption. This will increase the confidentiality and authentication.

3Q) One example of the solutions that was found in the problem2 is Hash Message Authentication Code(MAC). Describe the operation and principle of Hash MAC at i) sender and ii) receiver

Message Authentication Code is the cryptographic checksum generated by a function C.

MAC = Ck(M), where M is th emessage, k is the secret key and Ck(M) is the fixed length authenticator. The message authentication code is attached to the plain text for authenticatiopn check. At the source side the MAC is attacked to the plain text (M), then transmitted to the destination. At the destination side the reciever calculates the MAC over the received message M.

Requirements for MAC: The attacker is able to construct the message to match the Message Authenticatiopn Code even the unautherized attaker dontknow the key. The bruteforce attack based on plain text has to be prevented.

Properties of MAC:

a) MAC is a cryptographic checksum used for condensing the variable length message M

b) MAC uses the secret key K for providing the authentication.

Properties of Hash function(H):

a) Hash function can be applied to the message M of any size.

b) It produces fixed length block as output.

c) H(M) comp[utation is relatively easy for any message M.

d) One-way property: For any given code h, it is infeasible to find M such that H(M)=h

The geneeral Hash code expression is given as

Hi=mi1\oplus mi2\oplus mi3\oplus .........\oplus miL

where Hi = ith bit of the hash code

L is the number of n bit blocks in the input.

\oplus = XOR Operation.

Secure of HASH Function and HMAC:

The attacks on the hash and MAC can be categorized into two types

1) Brute Force attack and 2) Cryptoanalysis

Brute Force attack: It is the process of trying every possible key one by one and checks whether the resulting plain text is meaningful. For example if sender is using 16 bits as a key, the attacker prepares all the 216 possible keys and apply on the cipher to get plain text.

Hash Function: The strength of the hash function against the brutforce is on the length of the hash code produced by the algorithm.

Cryptoanalysis for Hash Function: Before moving to the security provisions to the hash function first we will look at the overall structure of a typical secure hash function.

Crptoanalysis for Message Authentication Code: There is more variety in the structure of the MAC than in the hash function. So it is difficul to generalize the cryptanalysis of the MAC

Add a comment
Know the answer?
Add Answer to:
please answer fast and neatly . please make sure its right 1 Hash (10 pts) m...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CAN BE BOTH SOLVED PLEASE 1)Suppose digital signature can be used to protect the integrity of...

    CAN BE BOTH SOLVED PLEASE 1)Suppose digital signature can be used to protect the integrity of the communications between Alice and Bob. Alice’s public key is eA, private key is dA; Bob’s public key is eB, private key is dB. Now Alice wants to send a message m to Bob. Describe the signature generation process, message components, and the signature verification process 2)Suppose message authentication code (MAC) can be used to protect the integrity of the communications between Alice and...

  • Please answer all Questions Fast and Neatly UDP Checksum (20 pts) Suppose a gender that is...

    Please answer all Questions Fast and Neatly UDP Checksum (20 pts) Suppose a gender that is to send a UDP datagram me given below. It is creating the checku. 1110 1101 1111 0110 0100 1010 Checksum 1111 0110 1. Find the binary sum of the other four fields than checksum (8 pts) 2. Wrap around the overflow and add to the least significant bit(s) if any. (2 pts) 3. Find the l's complement of the result of Problem 2. (2...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • Trying to make sure my answer is right. Please explain if not! Thanks! 1. (3 pts)...

    Trying to make sure my answer is right. Please explain if not! Thanks! 1. (3 pts) Provide 2 acceptable names for the molecule below. If you provide a systematic name, include the appropriate R or S designation in the name. 3-bromopropane Br 92-bromoprapy 2. (2 pts) Provide a systematic name for the molecule below. 12-dethy-dlaro heiane . (2 pts) Indicate whether the listed solvent is protic or aprotic. a. tert-butanol [(CH3)3COH] Protic protic b. formamide [HCON H2]

  • 1) (25 pts) Given the following table of velocity data t (s) v(m/s) a) (6 pts)...

    1) (25 pts) Given the following table of velocity data t (s) v(m/s) a) (6 pts) Estimate the position at 2 seconds (use 1/3 Simpson's rule) b) (6 pts) Estimate the acceleration at 2 seconds (use first order centered finite difference) c) (6 pts) Estimate the position at 3 seconds (use 3/8 Simpson's rule ) d) (7 pts) Estimate the acceleration at 3 seconds (use first order centered finite difference) 7 5 0 1 2 3 4 3 3.5 4...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • Please answer FAST ASAP I will rate you thumbs up ?? Problem 1 (50 points) For...

    Please answer FAST ASAP I will rate you thumbs up ?? Problem 1 (50 points) For H2O, determine the specified property at the indicated state. Locate the state on a sketch of the T-v diagram. State 1: p=20MPa, 7-520 C. It's on a superheated, saturated or compressed state? Find specific volume v, in m²/kg, and specific internal energy u, in kJ/kg. State 2: p=20MPa, v=4.76792*10-3 m®/kg. It's on a superheated, saturated or compressed state? Find quality x, temperature T, in...

  • please make sure the answer is correct 100% 1. [15 pts] Nitric oxide reacts with chlorine...

    please make sure the answer is correct 100% 1. [15 pts] Nitric oxide reacts with chlorine to form NOCI. The data refer to 298 K. 2NO (g) + Cl2(g) → 2NOCI (g) Substance: NO (g) Cl2(g) NOCI (g) 90.29 51.71 AHºf (kJ/mol): Sº (J/K-mol): 210.65 223.0 261.6 Calculate ASsurr and determine if the reaction is spontaneous at 298 K. 2. [10 pts] Rank the following compounds in order of decreasing molar entropy (the greatest is on the left). N204(g) at...

  • Instructions for PHY 2048 Problem Set (PSET): (1) Please NEATLY write your name and your solutions....

    Instructions for PHY 2048 Problem Set (PSET): (1) Please NEATLY write your name and your solutions. (2) You must use blank 8"x11" printer paper. (3) Begin each problem on a new page, and put your name on each page. Staple your pages together. 4) Only write on one side of the page. (5) You must write up your solutions independently (i.e. don't copy anyone else's solutions), using your own words and thought process. You must show all of your work....

  • please answer fast For the differential equation = (y + 1)(3-y), (a)Find the steady stat solutions and inflation points of your solution curve y(t) (b)Draw the graph of glu) vs. y, where g(u)Your...

    please answer fast For the differential equation = (y + 1)(3-y), (a)Find the steady stat solutions and inflation points of your solution curve y(t) (b)Draw the graph of glu) vs. y, where g(u)Your steady stats and stability arrows must be indicated on the graph- (c) Draw the solution curve y(t for initial value problem y(0)4, vith proper concavity, asymptotic behavior and points of inflection. For the differential equation = (y + 1)(3-y), (a)Find the steady stat solutions and inflation points...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT