Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
CO4510 Advanced Topics in IT Security
Answered

Question:

Alice want to send Bob a message “secretpassword” online and they want to achieve confidentiality, integrity and authenticity of the message.

i. Provide the definition of the confidentiality property and a cryptographic method to achieve

ii. Provide the definition of the integrity property and a cryptographic method to achieve that.

iii. Provide the definition of the authenticity property and a cryptographic method to achieve that.

(For the above 3 questions use the message format Func(Msg, Key) or Func(Msg) to explain, where any name of a crypto function can be in place of Func, any message in place of Msg, any key in place of Key).

b. Draw a diagram about the concepts of symmetric key encryption/decryption.

c. Draw a diagram about the concepts of asymmetric key encryption/decryption.

d. Draw a diagram about the concepts of the hash function and explain it.

e. Draw a diagram about the concepts of the digital signature and explain it.

2. A smart watch sends information about the health information of the owner to a smart phone to analyse.

a. Explain the main differences (at least two) between passive attacks and active attacks in general.

b. Provide one example for passive attack and one example for passive attack in this smart watch scenario.

c. How can a reflection attack happen against an authentication protocol between the smart watch and the smart phone?

d. How to protect against a reflection attack in this smart watch scenario?

e. Explain the replay attack against this smart watch scenario and provide a method to protect against it?

3. SocialEXAM is a social networking website that has users from the EU. After registering and signing in the users can add friends, posting and sharing messages, photos and videos with each other. During the registering phase, the users have to provide personal information such as name, email address, birthday and place of birth, phone number, etc.

a. SocialEXAM aims at implementing end-to-end accountability requirements.

i. Name the phases of end-to-end accountability based on the entire data lifecycle in general. Describe in one sentence the purpose of each accountability phase.

ii. How can each phase be applied to the case of SocialEXAM? You should provide and critically discuss at least three aspects for each phase of accountability.

iii. Provide at least two data protection regulations/laws or documents that SocialEXAM should follow.

support
close