Internet Security Questions

This is an assignment from my Internet Security class. These questions need to be complete before midnight tomorrow 02/16 (11PM)

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Internet Security Questions
Just from $13/Page
Order Essay

Georgia Gwinnett College
School of Science and Technology
ITEC 4320: Internet Security
Crypto Assignment
Problem 1 [40 Points]
Visit the site, read its certificate and find the following information.
a) [5 Points] Which CA issued and signed the certificate?
b) [5 Points] What is the subject?s identity? That is, to which company and website
is the certificate issued?
c) [5 Points] Which digital signature scheme and hash function is used to sign the
d) [5 Points] Which public-key encryption scheme is used to secure the
communication between your browser and the site, and what
is the length of the public key?
e) [5 Points] Which private-key encryption scheme is used to secure the
communication between your browser and the site, what is
the length of the key and what is the mode of operation?
f) [5 Points] Which key exchange protocol is used to establish a shared private key
between your browser and the site
g) [10 Points] What is the certification path for, and how does
your browser verify the certification path when you visit the site?
Problem 2 [20 Points]
During the discussions on SSL, we emphasized the importance of the integrity of the
certificate authority (CA). What damages can an attacker cause if he is able to
compromise a trusted CA? Be as comprehensive as you can in your answer, and use a
good concrete example to illustrate your answer.
Problem 3 [40 Points]
Consider the following key exchange protocol that allows two parties Alice and Bob to
establish a common secret key:
1. Bob generates a pair of keys (pk, sk) for a secure public-key encryption scheme,
where pk is the public encryption key and sk is the matching private decryption
key. Bob then sends pk to Alice.
2. Alice chooses a secret K, encrypts K using the key pk from Alice, and sends the
resulting ciphertext to Bob.
3. Bob decrypts the ciphertext from Alice using the key sk and obtains K.
The secret K, which both Alice and Bob have by the end of the protocol, is the common
secret established.
a) [5 Points] Explain why the above protocol is secure against passive attackers. A
passive attacker is one who can only intercept data by eavesdropping.
b) [20 Points] Show how an active attacker can break the protocol. An active
attacker is one who can not only eavesdrop, but can also block and alter data on
the network, and inject his own data into the network.
c) [15 Points] Show how to secure the protocol against active attackers using a
secure PKI.

Purchase answer to see full

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages

Order your essay today and save 15% with the discount code ESSAYHELP