Question

In: Computer Science

A certain symmetric encrption system El uses the following secret key (KI) for confidential communication between...

A certain symmetric encrption system El uses the following secret key (KI) for confidential communication between A and B FEA01FAA3459012D (hex) A decides to deliver this secret key (K1) to B by transmitting it over the same insecure channel using a second encryption scheme E2 a- What method of encryption would you suggest for E2? b- Based on your suggestion, what would be the size in bits of the key (K2) used in encryption system E2? c- If a system of computers has the ability to try 64 keys every 100 microseconds in an effort to decipher the message encrypted by E1 by brute force, how long (on average) would it take to break the code? d- Is El computationally secure?

Solutions

Expert Solution

solution:

a).

Public - key cryptography is well suited for achieving a secure communication over an insecure channel. In public-key cryptography, each party will be having 2 pairs of keys. One public key and one private key. The public key is accessible and can be request from a central authority known as CA (Certification Authority). This CA rusted source whose data is not corrupted. We can use an RSA algorithm as the asymmetric key based encryption mechanism for sending the key over an insecure channel.

b).

The key length for an RSA encryption algorithm will range between 1024 to 4096 bits. Though the key size can vary based on our requirements, commonly used mechnisms have the key length between the above mentioned sizes.

c).

Assuming a consistent performance of carcking 64 keys for every 100 micro seconds, the system will take a total of
computations to perform a bruteforce attack. And given that, the system will crack 64 keys every 100 microseconds(0.0001 seconds):

rounds(each taking 100 micro seconds)

The above calculation turns out to be taking approximately 913,972 years to break in.

d).

Based on the bruteforce attack mentioned, it is computationally secure as long as the key is securely transmitted.

please give me thumb up


Related Solutions

Answer the following questions about confidential client communication. a) Privilege is a common feature of the...
Answer the following questions about confidential client communication. a) Privilege is a common feature of the law; it extends to spouses, attorneys, doctors, and psychiatrists. What is the purpose of privilege? b) What is the current rule on accountant/client privilege under federal law? c) Alan, an attorney and a CPA, works as an accountant for the accounting firm of Tick and Tie. The SEC is investigating a client. Can Alan assert privilege and refuse to answer questions about the client?...
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the...
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the main differences of the following different encryption cryptosystems: the Block Ciphers DES and AES, Hash functions and the RSA cryptosystem and the EIGamal cryptosystem.
You are building a safe messaging system by using an Encryption such as private key (symmetric)...
You are building a safe messaging system by using an Encryption such as private key (symmetric) and public key (Asymmetric) that would prevent the utility company from knowing the content of the communications being exchanged. The receiver can be disconnected and cannot receive messages, how can this situation be managed by your system?
5.Contrast the level of security in a hotel that uses a hard-key system with that in...
5.Contrast the level of security in a hotel that uses a hard-key system with that in a hotel that uses an electronic key or smart card system.
In the interplay between system 1 and system 2 thinking, the key goal for managers is...
In the interplay between system 1 and system 2 thinking, the key goal for managers is in the interplay between system 1 and system 2 thinking, the key goal for managers is To attempt to use system 2 thinking as much as possible To identify when they should move from system 1 to system 2 thinking To apply both systems in making decisions in order to perform a more thorough and complex search for alternatives To improve their use of...
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that...
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial of service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
CHAP 2 KEY TERMS/ABBREVIATIONS PLEASE DEFINE: 1/AUTHORIZATION FORM 2/CLEARINGHOUSE 3/CONFIDENTIAL COMMUNICATION 4/CONSENT FORM 5/DISCLOSURE 6/FRAUD 7/NON...
CHAP 2 KEY TERMS/ABBREVIATIONS PLEASE DEFINE: 1/AUTHORIZATION FORM 2/CLEARINGHOUSE 3/CONFIDENTIAL COMMUNICATION 4/CONSENT FORM 5/DISCLOSURE 6/FRAUD 7/NON PRIVILEGED INFORMATION 8/NOTICE OF PRIVACY PRACTICE (NPP) 9/PRIVILEGED INFORMATION 10/BREACH OF CONFIDENTIAL 11/COMMUNICATION 12/COMPLIANCE PLAN 13/CONSENT 14/INDIVIDUALLY IDENTIFIABLE HEALTH 15/INFORMATION 16/PRIVACY 17/TRANSACTION ABBREVIATIONS: -EDI -CMS -CPT -NPP -OSHA
what is the key difference between ''property'' and ''non-property'' of a system in thermodynamics?
what is the key difference between ''property'' and ''non-property'' of a system in thermodynamics?
Wyman Corporation uses a process costing system. The company manufactured certain goods at a cost of...
Wyman Corporation uses a process costing system. The company manufactured certain goods at a cost of $890 and sold them on credit to Percy Corporation for $1,255. The complete journal entry to be made by Wyman at the time of this sale is: Debit Accounts Receivable $1,255; credit Sales $1,255; debit Cost of Goods Sold $890; credit Finished Goods Inventory $890. Debit Finished Goods Inventory $890; debit Sales $1,255; credit Accounts Receivable $1,255; credit Cost of Goods Sold $890. Debit...
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device...
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial-of-service attack. What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT