The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Short Paper #2
Description: The scenario description and requirements for Short Paper #2:
Prepare a short research paper of approximately 900-1000 words, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word attachment.
Please name submission file:
LastnameFirstname INFA640 SP2.doc;
Example: PathakDivaker INFA640 SP2.doc
Be certain that your paper contains the required certification as specified in the syllabus.
I will submit your paper to Turnitin.com to ensure non-plagiarisation
Scenario:
Anna changes banks following her troubles with TBT. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system. Anna creates a key pair and supplies to Felicity, an officer of UST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a thumb drive which he keeps locked in a wall safe at her home. In turn, Felicity gave Anna access to a key server maintained by UST so that she can readily obtain Felicity’ current public key {eF, nF} whenever she needs to communicate securely with Felicity.
Things are fine for several months until Anna sends Felicity a message m asking about current interest rates on Certificates of Deposit issued by UST. As shown below, she enciphers the message first, and then signs it
C = (mef mod nf)dAmod nA
Where C is the encrypted message and m is the plaintext message.
A few days later, Anna received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Felicity transferred the money out of Anna’s account into an account of her own in a bank on the Caribbean island of Nevis, where she moved. When reached via long distance in Nevis, Felicity produced a message ’g’ from Anna saying:
"Thanks for your excellent service, Felicity. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Anna."
Anna files suit against Felicity, UST and the government of the Nevis, claiming that the message was a forgery sent by Felicity herself, asking for triple damages for pain and suffering. Felicity has responded by claiming that all procedures were followed properly and that Anna is filing a nuisance suit.
You have been employed by UST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Anna issue. You obtain Felicity’s private key from the UST server, and the cipher text C, and calculate
g= (CeAmod nA)dFmod nf
Where g is the plain text message which was obtained the cipher text C
dF Is Felicity’s Private key
Your report to the UST Board of Directors should address the following issues: