16COC140. Cryptography and Network Security. Coursework

Added on - 19 Sep 2019

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 1 of 2 pages
16COC140 Cryptography and Network SecurityCourseworkAlice represents a company AAA that is considering buying Bob’s company,BBB. Eve knows about the proposed transaction and she will be able to gainfinancial advantage if she can find out as quickly as possible the details of thedeal. Eve can intercept the messages between Alice to Bob, but has no access totheir computers. She knows that they will communicate using the RSA public-keyencryption algorithm in its basic form, as described in the lectures. Eve has Bob’spublic key(e,n)wheree=7andnis a 256-bit integer. She does not have Bob’sprivate key. Eve also knows that the messages will be constructed as follows:1.An initial e-mail is sent by Alice to Bob to let him know of AAA’sdecision about trying or not to buy BBB. For a “no” decision, the messageis 0. For “yes”, the message is 1. The number 0 or 1, respectively, is thenencrypted using the RSA algorithm.2.The next day, Alice sends Bob an e-mail to inform him of the proposedprice offered. The message consists of an integer number representing theprice in pounds. This number is encrypted using RSA. Eve estimates theprice to be between 50 million and 60 million pounds.3.A third message is sent on the third day from Alice, consisting of a longertext (say 5,000 characters) discussing some initial details of the deal. Forthis e-mail, she uses the following method of encryption: each individualcharacter of the text is viewed as the integer corresponding to the ASCIIcode of that character. The number thus obtained for each character is thenencrypted using the RSA algorithm, and the resulting list of numbers issent.4.The following day Alice again writes a long e-mail (say 5,000 characters)discussing further details of the deal. For this e-mail, she uses thefollowing method of encryption: each single word of the text is viewed asan integer number in binary, obtained by concatenating the 8-bit binaryvalues of the ASCII code of each letter (including leading zeros). Thenumber thus obtained for each word is then encrypted using the RSAalgorithm and the resulting list of numbers is sent.i.Discuss whether Eve can find efficient methods of retrieving each of the fouroriginal messages.[10 marks]ii.For each attack you identified above, give a rough estimate of the time Evewould need to succeed.[3 marks]iii.For each of the attacks you identified above, propose changes to theencryption scheme to prevent such an attack.[7 marks]PTO
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access