Explore BrainMass
Share

Network security

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

I need detailed answers for these 2 questions.

1.Suppose we wish to use Kerberos for securing electronic mail. The obvious way of accomplishing this is for Alice, when sending a message to Bob, to obtain a ticket for Bob and include that in the email message, and to encrypt and/or integrity-protect the email message using the key in the ticket. The problem with this is that then the KDC would give Alice a quantity encrypted with Bob's password-derived master key, and then Alice could do off-line password guessing. How might Kerberos be extended to secure email without allowing off-line password guessing?
(Hint: Issue human users an extra, unguessable master key for use with mail, and extend the Kerberos protocol to allow Bob to safely obtain his unguessable master key from the KDC.)

2.Assume we are using secret key technology. What is wrong with the following source authentication scheme?
Alice chooses a per-message secret key K, and puts an encrypted version of K in the header for each recipient, (ie Bob and Ted). Next, Alice uses K to compute a MAC on the message, say a DES-CBC residue, or to compute a message digest of K and append it to the message.

(Hint: this works fine for a single recipient, but there is a security problem if Alice sends a multiple-recipient message. Once they receive the message, Bob and Ted know both K and K encrypted with the key they share with Alice. This allows either to forge a message to the other as if it were from Alice.)

© BrainMass Inc. brainmass.com October 24, 2018, 5:25 pm ad1c9bdddf
https://brainmass.com/computer-science/operating-systems/network-security-9708

Solution Summary

Network security is demonstrated.

$2.19
See Also This Related BrainMass Solution

Network security case study

In this case study, you are going to establish certain procedures that enable you and other network security specialists to evaluate a network from different possible threats and vulnerabilities. In this evaluation take into consideration different important points that should be looked at to decide how good the security of the network is. Give each security checklist some points or grade out of 100.Then calculate what percentage that your network got.

Write a report on network security and based on what holes that you find when you audit a network (like defence network) give recommendations to make the network more secure.
Make a summary of check list for security

View Full Posting Details