CSc 4222/6222 Assignment 4 URL obfuscation attacks

$30.00

Category: Tags: , , , , , You will Instantly receive a download link for .zip solution file upon Payment || To Order Original Work Click Custom Order?

Description

5/5 - (5 votes)

1. Describe a method for protecting users against URL obfuscation attacks.
2. Suppose a web client and web server for a popular shopping website have performed
a key exchange so that they are now sharing a secret session key. Describe a secure
method for the web client to navigate various shopping site pages, optionally placing
things into a shopping cart. Your solution is allowed to use one-way hash functions
and pseudo-random number generators, but it cannot use HTTPS, so it does not need
to achieve confidentiality. In any case, your solution should be resistant to HTTP
session hijacking even from someone who can sniff all the packets.
3. What is the encryption of the following string using the Caesar cipher:
INFORMATIONSECURITY?
4. a. Compute the multiplicative inverse of 7 in Z23.
b. Show the steps and intermediate results of applying the extended Euclidean
algorithm to compute the GCD of 512 and 240.
5. Find keys d and e for the RSA cryptosystem with p = 17 and q = 11; encrypt a given
message M=88; show your steps. (Tips: you may use the following site is helpful in the
calculation: https://www.wolframalpha.com/input/?i=19%5E5+mod+119 )
6. Demonstrate that the hash function H(x) = 5x + 11 mod 19 is not weakly collisionresistant, for H(4).
7. Explain why nonforgeability and nonmutability imply nonrepudiation for digital
signatures.
8. Alice wants to send a large document as an encrypted attachment to an email to Bob
over the internet. Alice also wants Bob to know that this attachment was sent by her
(and not a forged attachment sent by someone else). Assume Alice and Bob have each
other’s public keys.
In the questions below, use the cryptographic primitives we’ve discussed in class.
Define any cryptographic functions that you use. For example: one could say:
– H is cryptographic hash function, or H is MD5;
– PKa, SKa, PKb, SKb ­ Alice and Bob’s public/private key pairs
– Ek()/Dk() ­­ Authenticated encryption/decryption scheme using key k (say,
AES­GCM)
– Enc()/Dec() ­­ Public key encryption/Decryption (say, RSA encryption)
– Sign/Verify ­­ Digital signature/verification algorithm (say, RSA signature)
A. Give the steps for Alice to prepare the attachment that will be sent.
B. Give the steps for Bob to decrypt Alice’s attachment and verify that the message is
valid and authentic (it has not been tampered and it was definitely sent by Alice).
9. Bitcoin is designed such that the attacker cannot reverse or tamper with the transactions.
Explain how, referencing its technical design features as needed.
10. a. Describe the difference between privacy and confidentiality.
b. In Cyber Forensics, it is important to acquire the evidence without altering the
original. Name an approach to allow us to demonstrate that the image evidence is a true,
unaltered copy of the original?