Premium Essay

Alice and Bob

In:

Submitted By saheeda
Words 461
Pages 2
Description: The scenario description and requirements for Short White Paper

Prepare a short research paper of approximately 5 pages, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception those tables and figures (if used) can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word attachment with the following file name: yourlastnameSSB.doc For example, a submission file would be called yorkmanSSB.doc

Alice, a high net worth customer, banks on-line at Super Secure Bank (SSB) and has agreed to use 3DES in communicating with SSB. One day, Alice received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Bob, transferred the money out of Alice's account and into an account of his own in an offshore bank. When reached via long distance in the Cayman Islands, Bob produced a message from Alice, properly encrypted with the agreed upon 3DES keys, saying: "Thanks for your many years of fine service, Bob. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Alice."

Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for triple damages for pain and suffering. Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. You have been employed by SSB as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter.

Your report to the Board of Directors should address the following issues: • What continue using

Similar Documents

Premium Essay

The Sundale Club Case Analysis

...the list has been exhausted and the director, Bob Watts, is considering a membership drive to fill unexpected membership vacancies. Alice Smith was thinking about her modeling job on her way home that evening. Today had been dandy. Ted Ellis, the athletic director, had fired Pat Franklin, who had worked for Sundale for nearly nine years. The Problem The whole mess started five months ago when Ellis hired Chuck Johnson to become the men’s activity manager. Shortly after Johnson arrived, rumors started that he was a homosexual. Two of the members complained to Frank Havens, the assistant athletic director, that Johnson had made verbal passes at them. Ted Ellis and Johnson were close friends, so Havens was reluctant to approach his boss with this problem. During the next few years more incidents involving Johnson’s behavior were reported by various staff members to Havens, in addition to complaints from club members. Havens could sense that his staff was wondering why he had not done something about the situation, and he was aware that seven of the male members had withdrawn from the club. Finally, he requested a meeting with Ted Ellis. The Meeting The meeting with Ellis did not go well. Ted Ellis was extremely defensive about Johnson and shouted, “Chuck Johnson has more savvy about this business in his little finger than the whole bunch of you put together.” That night, Frank decided to go over Ellis’s head and talk to Bob Watts. Watts was due to retire next year, so...

Words: 700 - Pages: 3

Premium Essay

Case Study

...the list has been exhausted and the director, Bob Watts, is considering a membership drive to fill unexpected membership vacancies. Alice Smith was thinking about her modeling job on her way home that evening. Today had been dandy. Ted Ellis, the athletic director, had fired Pat Franklin, who had worked for Sundale for nearly nine years. The Problem The whole mess started five months ago when Ellis hired Chuck Johnson to become the mens activity manager. Shortly after Johnson arrived, rumors started that he was a homosexual. Two of the members complained to Frank Havens, the assistant athletic director, that Johnson had made verbal passes at them. Ted Ellis and Johnson were close friends, so Havens was reluctant to approach his boss with this problem. During the next few years more incidents involving Johnsons behavior were reported by various staff members to Havens, in addition to complaints from club members. Havens could sense that his staff was wondering why he had not done something about the situation, and he was aware that seven of the male members had withdrawn from the club. Finally, he requested a meeting with Ted Ellis. The Meeting The meeting with Ellis did not go well. Ted Ellis was extremely defensive about Johnson and shouted, Chuck Johnson has more savvy about this business in his little finger than the whole bunch of you put together. That night, Frank decided to go over Elliss head and talk to Bob Watts. Watts was due to retire next year, so he...

Words: 1284 - Pages: 6

Premium Essay

Nt1330 Unit 1 Assignment 1

...exchange of these items. If we can manage trust in every exchange through different protocols to verify the truth of facts in any exchange, we can then have an internet of trust. We will be demonstrating this trust by playing the classic game of Battleship between two players Alice & Bob that have just meet online for the first time. We will be implementing cryptographic hashing algorithms and digital signatures in order to verify the data between our two players to be true, but to also maintain the integrity of the moves being played. This will help to prove that our data has not been modified by an unauthorized entity or adversary...

Words: 788 - Pages: 4

Premium Essay

Social Class Division Analysis

...Bob’s fiancé, Alice, lives in the West Side of town. As Bob was going to pick her up for a dinner date, he rants about the nice area Alice lives in. Bob goes on to say that whenever a Negro is asked where he lived, he would say the West Side signifying that he was better than a Negro who lives in the South Side. In comparison to white folks, the West Side would resemble Beverly Hills (pg 48). Alice’s mother with tears in her eyes explains how her husband “went into a restaurant downtown where he’s been eating for years and they didn’t want to serve him” (pg 52). Apparently, it was not a white employee but a Southern Negro. Even people of their same race has neglected those of a higher class due to a social class difference. Another factor that exemplifies a line of division is the color differentiation between Bob and Alice. Alice is of a lighter complexion of skin to the point that she can be recognized as a white woman. Bob admires the fact that he is with a lady that resembles a white lady. However at times, he feels...

Words: 533 - Pages: 3

Premium Essay

Work

...INFA640 Research Paper Two. SCENARIO ONE: 1. Alice, a high net worth customer, she banks online at Super Secure Bank (SSB) and has agreed to use 3DES in communicating with SSB. 2. One day, Alice received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager,Bob, transferred the money out of Alice's account and into an account of his own in an offshore bank. 3. When reached via email in the Cayman Islands, Bob produced a message from Alice, properly encrypted with the agreed upon 3DES keys, saying: "Thanks for your many years of fine service, Bob. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Alice." 4. Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for triple damages for pain and suffering. 5. Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. Your Role: Informed that you have completed an Information Assurance Masters Degree at the University of Maryland University College, the SSB employed you as a cryptographic expert to lead the investigation of this matter, and produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter. Your professional fee for this service will be $25,000. Your Report: This document to the Board of Directors should address...

Words: 888 - Pages: 4

Free Essay

Audi

...Dr. Liao ITC 520, Fall 2015 Homework 3 (75 points) Assigned: Due: Wednesday, November 4, 2015 5pm, Wednesday, November 18, 2015 Purpose Practice on CIA and AAA. Part A: Authentication (15 pts) Consider the following authentication protocol for two parties to mutually authenticate to each other. Bob sends authentication request to Alice. Alice generates a random challenge message c, encrypts it with the key k that she shares with Bob, and sends the Ek (c) to Bob. Bob decrypts it, adds 1 to c, and sends Ek (c + 1) back to Alice. Alice decrypts the message and compares it with c. If the difference is 1, Bob is authenticated. Simultaneously, Alice sends authentication request to Bob, and Bob performs the same operation as described above to authenticate Alice in the same manner. Does the above mutual authentication secure? Why or why not? Part B: Authorization (15 pts) Suppose you are hired as a research assistant (RA) for Professor Liao. All RAs and Prof. Liao belong to the same group. On his Unix server, a directory called Research contain all research data and has the permission bits set as 730. There is one file under that directory called paper.tex owned by Prof. Liao and has the permission bits set as 644. Is it secure, and can anyone else other than Prof. Liao can modifier his paper? If you think it is not secure, include a step-bystep instruction on how to modify the file, and you must explain the underlying cause for such compromise. Part C: Authorization (15 pts) Assume...

Words: 425 - Pages: 2

Premium Essay

Cs200 Fundamentals of Information Technology

...helping to develop a library system for your community. Here is a brief description of scenarios of using this library system. • Bob applied for a new membership to use this library. He provided his name, address, phone number, and driver license to a librarian Alice. Alice logged into the system with her id and applied the membership for Bob, Then Bob got his new library card. • He wanted to use his new card to borrow several books. He wanted to borrow a novel by C.S. Lewis. But he didn’t remember the book name. Alice helped him use key words and author name search to find the book “The chronicles of Narnia” on one of the library’s computers. • However, this book was not available. He requested the book so that the book can be recalled. Alice told him that he will be informed when the book was ready to pick up. Alice helped him check out other books. • He checked the status of book everyday online. His wife also wants to borrow a cook book. He reserved that cook book too. After a couple of days, he got a call that “The chronicles of Narnia” was available. He went to pick it up as well as the cook book and a couple of other books. • After he finished reading the books, he went to return the books. And because some books are passed due date, he need pay some fine. • After two years, Bob need to move to another city. He went to library, and Alice helped him cancel his library membership. Please answer the following questions, and submit your assignment as a single Word document...

Words: 576 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...In the above figure, sender Alice will encrypt all the files before uploading it to the cloud. Here in our example, we are taking Dropbox.While encrypting the files sender will encrypt with public key and also with ciphertext identifier called class. This ciphertext are further classified into different classes. Here Alice (Key Owner) will hold private key called master secret key, which extract secret key from different classes. The receiver Bob interested in few files(2,3,6,8) among the set of many ( 1,2,3,4,5,6,7,8) files which was uploaded by Alice in cloud. When request from Bob will reach to Alice, sender Alice will generate aggregate key (single key) for all the files which was requested by Bob. With the help of master secret key, aggregate key will be generated and send it to receiver Bob. With the help of single aggregate key, Bob will decrypt the content of files....

Words: 521 - Pages: 3

Free Essay

Discrete Maths

...21-110: Problem Solving in Recreational Mathematics Homework assignment 7 solutions Problem 1. An urn contains five red balls and three yellow balls. Two balls are drawn from the urn at random, without replacement. (a) In this scenario, what is the experiment? What is the sample space? (b) What is the probability that the first ball drawn is red? (c) What is the probability that at least one of the two balls drawn is red? (d) What is the (conditional) probability that the second ball drawn is red, given that the first ball drawn is red? Solution. (a) The experiment is the drawing of two balls from the urn without replacement. The sample space is the set of possible outcomes, of which there are four: drawing two red balls; drawing two yellow balls; drawing a red ball first, and then a yellow ball; and drawing a yellow ball first, and then a red ball. One way to denote the sample space is in set notation, abbreviating the colors red and yellow: sample space = {RR, YY, RY, YR}. Note that these four outcomes are not equally likely. We can also represent the experiment and the possible outcomes in a probability tree diagram, as shown below. Note in particular the probabilities given for the second ball. For example, if the first ball is red, then four out of the remaining seven balls are red, so the probability that the second ball is red is 4/7 (and the probability that it is yellow is 3/7). On the other hand, if the first ball is yellow, then five out of the remaining...

Words: 4161 - Pages: 17

Premium Essay

Ch01-Introduction

...Introduction 1 Defining Security • The security of a system, application, or protocol is always relative to – A set of desired properties – An adversary with specific capabilities • For example, standard file access permissions in Linux and Windows are not effective against an adversary who can boot from a CD 2 Security Goals Integrity • C.I.A. Confidentiality Availability 3 Confidentiality • Confidentiality is the avoidance of the unauthorized disclosure of information. – confidentiality involves the protection of data, providing access for those who are allowed to see it while disallowing others from learning anything about its content. 4 Tools for Confidentiality • Encryption: the transformation of information using a secret, called an encryption key, so that the transformed information can only be read using another secret, called the decryption key (which may, in some cases, be the same as the encryption key). Sender Communication channel Recipient encrypt ciphertext p ain ex plaintext int decrypt plaintext shared secret key shared secret key Attacker (eavesdropping) 5 Tools for Confidentiality • Access control: rules and policies that limit access to confidential information to those people and/or systems with a “need to know.” – This need to know may be determined by identity, such as a person’s name or a computer’s serial number, or by a role that a person has, such as being a manager or a computer security...

Words: 3091 - Pages: 13

Free Essay

On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks

...On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks A B.Tech Project Report submitted in fulfilment of the requirements for the Degree of Bachelor of Technology Submitted by K Bharadwaj Sharma 07010219 M Krishna Chaitanya 07010228 Under the Guidance of Dr.Ratnajit Bhattacharjee Department of Electronics and Electrical Engineering Indian Institute of Technology Guwahati Guwahati-781039, Assam i Candidate’s Declaration I hereby declare that the work which is being reported in this thesis entitled “ On Implementation of Elliptic Curve Cryptography and self-certified public key cryptosystems in Wireless Mesh Networks “ in partial fulfilment of the requirements for the award of the Degree of Bachelor of Technology, submitted in the Department of Electronics and Communication Engineering, Indian Institute of Technology Guwahati, is a record of my own work carried out during my thesis work under the supervision of Dr.Ratnajit Bhattacharjee, Associate Professor, Department of EEE, IIT Guwahati. The matter entitled in this thesis has not been submitted elsewhere for the award of any other degree. Place: Guwahati Date: 21st April, 2011 This is to certify that the above statement made by the candidate is correct to the best of my knowledge. April,2011 IIT Guwahati ` Supervisor: Dr. Ratnajit Bhattacharjee Associate Professor Dept. of EEE IIT Guwahati ii ACKNOWLEDGEMENT First and foremost...

Words: 7761 - Pages: 32

Free Essay

Cryptography

...Cryptography is an excellent art/science of protecting data from unwanted intruders by transforming the data to an unreadable format which can be brought back to the original form only by those who are authenticated to do so. This system depends vastly on a principle of key usage and is the basic underlying principle of network security. A detailed technical discussion of cryptography ,particularly from a network’s stand point provides a compelling and an up to date examination of the political and the social issues that are now inextricably intertwined with cryptography. A complete discussion of cryptography itself requires a complete book and so we touch on only the essential aspects of cryptography. It is now high time to introduce Alice and Bob who are essentially the widely accepted persons for a discussion on networks as communicators. Also ,the third party Trudy ,the intruder also has a wide role to play in hacking the discussion of the two. So the whole thread would hang about these three and the ways there adhere to secure and hack the data that is transmitted. A First look on Terminologies Now its high time to know the basic terminologies of Cryptography. Firstly the text that we type in the human understandable format is called as the Plain Text. The plain text is then converted to a generally incomprehensive form called as the Cipher text using a technique called Encryption which usually does this, and the cipher is transmitted. Precisely a particular encoding...

Words: 1831 - Pages: 8

Premium Essay

Fundamentals of Information Technology Module 1

... Suppose you are helping to develop a library system for your community. Here is a brief description of various scenarios using this library system. • Bob wanted to become a member at his local library. He went in and filled out an application form with his name, address, phone number, and driver's license number and gave it to the librarian, Alice. Alice logged into the system with her id and created a new membership for Bob. She then provided Bob with his new library card, and a login and password to his account. • Bob wanted to borrow two novels by C.S. Lewis, but he couldn’t remember their names. He used one of the computers at the library to search for the books by using the author's name. He found the titles he wanted, which were “The Chronicles of Narnia” and "The Space Trilogy". The first book was shown as available, and the second book was shown as out on loan. • Using his new login and password, Bob logged into his account and requested the book "The Space Trilogy" in order to recall it, so that when the book was returned it would be held for him at the library. • Bob then went to the stacks and found the book "The Chronicles of Narnia" on the shelf, and waited in line at the desk to check it out. He presented his ID card, and checked out the book with the librarian. • Before leaving the library, Bob saw his friend Simon. He chatted with Simon (quietly), and asked if he was a member and came to the library often. Simon said yes he was, and that he came...

Words: 588 - Pages: 3

Premium Essay

Temporal Lobe

...Fall Prof. Lingyu Wang Sample Exam Questions Important notice: These sample questions are only intended for reference purposes. The actual exam will have problems that are different in format and in nature, problems that cover broader topics, and problems that are more difficult. 1. Link each example to one corresponding term and all corresponding security objectives: Term Snooping Example Security Objectives A network sniffer captures transmitted password Confidentiality and later replays the password to gain Integrity unauthorized access (As this is a sample question, there is only one row in the table, so the answer is already given) 2. Consider the following scenario. In a class, we have students Alice, Bob, Eve, and an instructor Mallory. Suppose Alice, Bob, and Mallory each own a textbook, but Eve does not. Also suppose the instructor can ask students questions and students can answer; at the same time, students can also ask instructor, to which both instructor and other students can answer; however, a student cannot ask other students questions in class. Draw an access control matrix to model the above rules. Suppose it is decided that each person can read his/her own textbook in class. Write one command to make the required changes to the access control matrix. 3. Answer true or false to the following questions by circling the correct answer: If an algorithm could be found to say ‘secure’ for all input protection systems that are indeed secure, then the...

Words: 592 - Pages: 3

Premium Essay

The Great Gatsby Dialectical Journal Essay

...the two white men is the first event of violence that victimizes Jones. This is the first time he feels helpless and in despair. 2. In addition to the racial divisions that the novel describes, Himes also focuses on skin color. Alice having lighter skin, uses that to her advantage and passes as a white woman. She...

Words: 433 - Pages: 2