Question

In: Computer Science

Suppose a manager has write permission only for the usmUserOwnAuthKeyChange column in usmUserTable, which allows change...

Suppose a manager has write permission only for the usmUserOwnAuthKeyChange column in usmUserTable, which allows change of only that manager’s password. However, the manager has full write access to the VACM tables. Explain how the manager can modify the local keys of other managers.

Solutions

Expert Solution

The manager will need to communicate the new key to the agent in such a way that it is not exposed to private converstation. Here is the mechanism, where, again, hash() is either MD5 or SHA-1 as appropriate, will use N to denote the length in bytes of the result of hash(). The original key is here denoted oldkey and the new key is newkey. The manager first chooses a string random of N bytes chosen as randomly as possible. A second N-byte string delta is then calculated as follows:

temp = hash(oldkey⏜random)
delta = temp XOR newkey

At this point, random and delta are sent from the manager to the agent. The agent can use random and oldkey to compute temp, and thus newkey = delta XOR temp. An private conversation cannot use random to find out anything about temp without knowing oldkey, and cannot get anything useful out of delta unless either newkey or temp is known.

The actual process is to combine random and delta into a single 2N-byte keyChange string, written to one of the key-change columns of usmUserTable where authkey column representing the local key corresponding to Name, that is never directly rachable or writable, however the agent must still keep the authkey tied to the Name. so it can be validate a given user on the Name and authParmeter supplied in a request. if an eavesdropper saves random and delta, and later discovers the user’s oldkey, then newkey can be calculated easily.


Related Solutions

Suppose you are the manager of Speedy Oil Change which claims that it will change the...
Suppose you are the manager of Speedy Oil Change which claims that it will change the oil in customers’ cars in less than 30 minutes on average. Further suppose that several complaints have been filed from customers stating that their oil change took longer than 30 minutes. Upper-level management at Speedy Oil Change headquarters has requested that you investigate the complaints. To begin your investigation, you randomly audit 36 oil changes performed by Speedy Oil Change and record the time...
Problem I: Suppose you are the manager of Speedy Oil Change which claims that it will...
Problem I: Suppose you are the manager of Speedy Oil Change which claims that it will change the oil in customers’ cars in less than 30 minutes on average. Further suppose that several complaints have been filed from customers stating that their oil change took longer than 30 minutes. Upper-level management at Speedy Oil Change headquarters has requested that you investigate the complaints. To begin your investigation, you randomly audit 36 oil changes performed by Speedy Oil Change and record...
There is a table t with a column salary which is the primary key. Write a...
There is a table t with a column salary which is the primary key. Write a query to get the nth minimum salary without using multi query or limit. You will be awarded no points if you use multi query or limit or rownum or rowid. no subquery are allowed. please solve it with joins
Which best describes a tenancy at sufferance? When the tenant has received oral permission to stay....
Which best describes a tenancy at sufferance? When the tenant has received oral permission to stay. When the tenant stays beyond her lease without consent. When the tenant has received notice to terminate a lease. When the tenant’s lease has a definite termination date. Which of the following is NOT an example of an interest in real estate? A real estate agent's right to advertise a property for sale. A lender's right to file a lien against a property. A...
3 The Aledo Company, which has only been in business since 2017, decided to change from...
3 The Aledo Company, which has only been in business since 2017, decided to change from the Average Cost to the FIFO inventory cost flow assumption for financial reporting purposes. The following data are available in regard to its pretax operating income and cost of goods sold:                         Average Cost                                      Net Income                  FIFO Income Year                As Reported                Net Income 2017                $40,000                        $48,000 2018                46,000                        56,000 2019                  50,000                        62,000 Required 1. Ignoring tax effects. Compute the...
Suppose that the coefficient matrix of a homogeneous system of equations has a column of zeros....
Suppose that the coefficient matrix of a homogeneous system of equations has a column of zeros. Prove that the system has infinitely many solutions. What are the possibilities for the number of solutions to a linear system of equations? Can you definitively rule out any of these?
Write a program (C++) which allows a League of Legends player to both store and output...
Write a program (C++) which allows a League of Legends player to both store and output statistics on their games played. When the program starts it allows the user to enter new entries. The entries contain the following information: Champion Name Kills Assists Deaths Win? Each entry is appended to a file called games.txt. When the user is done entering data the statistics from the games in the file are to be displayed. The average kills, assists, and deaths are...
Which theory is the manager using if planning change on the unit focuses on the self-motivation...
Which theory is the manager using if planning change on the unit focuses on the self-motivation and commitment of the employees? Theory Y Path-Goal theory Social Role theory Hierarchy of Needs theory
Write a program which reads the matrix A (2x2 matrix taking the first two column vectors...
Write a program which reads the matrix A (2x2 matrix taking the first two column vectors from the input file) and the vector b (the third column vector) and solve for x in Ax=b for general A. If there is a unique solution, your output should be a 2x2 matrix with two lines and two numbers per line. The output should contain numbers with up to four significant digits. If the system is unsolvable or inconsistent, then your output should...
4. In the key change operation of 20.15.7 Key Changes, suppose the manager simply transmitted delta2...
4. In the key change operation of 20.15.7 Key Changes, suppose the manager simply transmitted delta2 = oldkey XOR newkey to the agent. Suppose an eavesdropper discovers delta2 and also knows a few bits of oldkey. What can the eavesdropper learn about newkey? Would the same vulnerability apply to the mechanism of 20.15.7 Key Changes? Suppose an eavesdropper later discovers newkey. Explain how to recover oldkey, and why this does not work when the mechanism of 20.15.7 Key Changes is...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT