Question

In: Computer Science

Try to make it as simple as you can and explain as much as it needed....

Try to make it as simple as you can and explain as much as it needed.

  1. Define Integrity and Nonrepudiation? (2 points)

Ans:

  1. What are the differences between Stream Cipher and Block Cipher? (2 points)

Ans:

  1. What is Access Control and why is it important? (2 points)

Ans:

  1. Message Authentication Code ensures authentication or integrity or both? Justify and explain your answer. (3 points)

Ans:

  1. What are the weaknesses of DES? Why triple DES is better than Double DES? (3 points)

Ans:

Solutions

Expert Solution

(1) - Integrity is a fundamental requirement of a trustworthy identity infrastructure. Identity systems exchange credentials as well as messages and transactions regarding attributes, provisioning information, and other data. Trusting that the contents have not been tampered with is important. As an example, consider a document representing identity credentials. To trust those credentials, we must be able to verify they are authentic and have not been changed.

Non-Repudiation, is an assurance mechanism that that provides proof of the integrity and origin of data. An authentication that the message was sent by the send that can be asserted to be genuine with high assurance. This term was most often used in Business to Business transactions where the sender wanted assurance that an electronic purchase order for goods and services could not be repudiated later by the person who sent in a purchase order. A good example of non-repudiation is the blockchain, the mechanism by which Bitcoins are moved from one person to another.

(2) -

S.NO BLOCK CIPHER STREAM CIPHER
1. Block Cipher Converts the plain text into cipher text by taking plain text’s block at a time. Stream Cipher Converts the plain text into cipher text by taking 1 byte of plain text at a time.
2. Block cipher uses either 64 bits or more than 64 bits. While stream cipher uses 8 bits.
3. The complexity of block cipher is simple. While stream cipher is more complex.
4. Block cipher Uses confusion as well as diffusion. While stream cipher uses only confusion.
5. In block cipher, reverse encrypted text is hard. While in stream cipher, reverse encrypted text is easy.
6. The algorithm modes which are used in block cipher are: ECB (Electronic Code Book) and CBC (Cipher Block Chaining). The algorithm modes which are used in stream cipher are: CFB (Cipher Feedback) and OFB (Output Feedback).
7. Block cipher works on transposition techniques like Caesar cipher, polygram substitution cipher, etc. While stream cipher works on substitution techniques like rail-fence technique, columnar transposition technique, etc.
8. Block cipher is slow as compared to stream cipher. While stream cipher is fast in comparison to block cipher.

(3) - Access control is a security system that enables an organization or authority to control access at specific dates and time to certain areas of a community, building, or residence. It can also be described as a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.

Importance -

  • Protecting your Employees – provide a safe working environment
  • Restrict unauthorized access and reduce theft – control who has access to where and at what time
  • Provide remote access – does a contractor need to access building but no-one is on site to let them in? You can provide access to your site remotely and you always know who is coming and going
  • Eliminate key problems – no more keys, you can use swipe cards, tags, fingerprints or even your mobile phone
  • Electronic visitor, history logging and reports – every access is logged and recorded. Reports allow you to see who is where in your building in case of an emergency.

(4) - Message Authentication Code(MAC) ensures both authentication and integrity. It uses a cryptographic checksum on data that uses a session key to detect both accidental and intentional modifications of the data. A MAC requires two inputs: a message and a secret key known only to the originator of the message and its intended recipient(s). This allows the recipient of the message to verify the integrity of the message and authenticate that the messege's sender has the shared secret key. If a sender doesn’t know the secret key, the hash value would then be different, which would tell the recipient that the message was not from the original sender.

(5) - Weakness of DES - Weakness has been found in the design of the cipher:
a. Two chosen input to an S-box can create the same output.
b. The purpose of initial and final permutation is not clear.

Triple DES is better than Double DES because it is much more secured than the original DES because it uses 112 and 168 bit keys respectively. It expands the size of the key by running the algorithm in succession with three different keys. It makes 48 passes through the algorithm. The resulting key is 168 bits; this can be hard to implement, so there is also a two-key option provided in 3DES that runs through a method called Encrypt-Decrypt-Encrypt (EDE):


Related Solutions

Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. What is Trusted Third Party (TTP)? What are the problems with TTP? (3 points) Ans: Using Caesar cipher algorithm and key value = 4, encrypt the plain text “Network Security”. Show your work.          (3 points) Ans: Let k be the encipherment key for a Caesar cipher. The decipherment key differs; it is 26 - k. One of the characteristics of a public key system...
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. Define Integrity and Nonrepudiation? (2 points) Ans: What are the differences between Stream Cipher and Block Cipher? (2 points) Ans: What is Access Control and why is it important? (2 points) Ans: Message Authentication Code ensures authentication or integrity or both? Justify and explain your answer. (3 points) Ans: What are the weaknesses of DES? Why triple DES is better than Double DES? (3...
Try to make it as simple as you can and explain as much as it needed....
Try to make it as simple as you can and explain as much as it needed. What are the differences between symmetric encryption and asymmetric encryption? (1 point) Ans: What is pseudo random numbers? (1 point) Ans: What is Moore’s Law? (1 point) Ans: What are four different block cipher modes? (1 point) Ans: What is one-time pad? (1 point) Ans:
Try to make it as simple as you can. You need to do some research on...
Try to make it as simple as you can. You need to do some research on different types of cryptography libraries in Python. Find out how can we use cryptography libraries in Python. Write down the steps to install the cryptography library in Python. Write a small program to encrypt and decrypt a message using the Python library.
Try to make it as simple as you can. Please provide the answers with some examples...
Try to make it as simple as you can. Please provide the answers with some examples as fast as you can. 11-Which of the following do all domains in the same forest have in common? (Choose all that apply.) a) The same domain name    b) The same schema c) The same user accounts    d) The same global catalog   12-Which of the following is a valid reason for using multiple forests? a) Centralized management     b) Need for different schemas c) Easy...
Wi-Fi RF Linearization can you explain this topic in a simple way to make me understand...
Wi-Fi RF Linearization can you explain this topic in a simple way to make me understand it ?
How much of each of the solutions is needed to make the buffer? Final volume is...
How much of each of the solutions is needed to make the buffer? Final volume is 10 mL. stock solutions 1 M HEPES (pH 7.9) 5 M NaCl 1 M BME 100 mM EDTA 750 mM MgCl2 50% glycerol C) nuclear extraction buffer 20 mM HEPES 1 M NaCl 1 mM BME 0.5 mM EDTA 1.5 mM MgCl2 25% glycerol
How can you calculate the physics needed to design a simple Wind Fan to Convert wind...
How can you calculate the physics needed to design a simple Wind Fan to Convert wind energy to Rotational Energy, write your explanation assume the following dimensions: min. tower height: half a meter min fan diameter: 0.15 meter min shaft length 0.10 meter number of blades: three
Discussion The difference between compounding and simple interest? Are you surprised how much money you can...
Discussion The difference between compounding and simple interest? Are you surprised how much money you can quickly owe with a compound interest loan agreement?
How much ice is needed to make ice tea at a temperature of 50 C from...
How much ice is needed to make ice tea at a temperature of 50 C from 140 grams of hot tea at 650 C contained in a glass container of 50 gm with specific heat equal to 0.2 cal/gm0 C. Treat the tea as colored water.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT