Encerrado

Cybersecurity document Part 1, 2 or 3

Question 3: Protocol Design and Analysis

You are a reporter who is meeting a potential whistle-blower in person, in an effort to establish

subsequent communication. The two of you are currently sitting back to back in a busy park

bench, where he agrees to collaborate. During the encounter, he gives you a business card

with his email and a secret 10-digit number, while you provide him with a SHA-3 hash digest

of your public key.

You further agree on the following protocol: The informant will wait for your initial contact

and subsequent requests for certain documents. You should not assume that any trusted-third

party could assist you in this situation; you will never meet in person again.

1. Identify and justify a realistic threat model for the described scenario, i.e.:

• who are the adversaries

• what are their goals (or what do you want the protocol to protect against)

• what are their capabilities/constraints

(a good answer would probably take at most 1 page)

2. Should the 10-digit number be used as a symmetric secret key? Explain your reasoning.

(a good answer would probably take at most half a page)

3. Propose your own authentication and data transfer protocol to be used between you

and the informant. Make sure you justify your design decisions. Identify and discuss

security implications of your design.

(a good answer would probably take at most 3 to 4 pages)

Note: use the notation introduced in the class; remember

Habilidades: Segurança de computadores, Segurança de Internet

Veja mais: chrome_yahoo #1 2 and 3, chromeyahoo 1 2 and 3, lotus 1-2-3, nist cybersecurity framework spreadsheet, fda cybersecurity guidance 2018, cyber survivability endorsement implementation guide (cseig), nist cybersecurity framework assessment tool, joint staff j6 guidebook cyber survivability endorsement implementation guide, mapping nist 800-53 to iso 27001:2013, fda postmarket cybersecurity guidance, fda cybersecurity guidance 2017, magento show 1 2 3 4 5 project type fixed hourly, 1 1 2 years old baby new fashion latest model frocks in white colour, 3d creator online v 3.1 2.13, data entry form near okhla phase 1 2 3, https scribie com freelance transcription rc 1 b 1 5 1 2 8 0 eb 5 0 e 8 0 0 1 d 3 8 fa 2 cd 6 bf 5 3 e 0 2 eb 1 2 0 c 8, kerja part time 1 2 jam perhari gaji puluhan juta rupiah facebook, seeking freelance part 1 or 2 architects or cad technicians to take on contract work, 1 2 3 e greeting cards, jquery 1.2 3

Acerca do Empregador:
( 0 comentários ) London, United Kingdom

ID do Projeto: #18684157

10 freelancers estão ofertando em média £410 para esse trabalho

rozeny2k

Hi. I am an experienced technical writer with an MS in Computer Science and Engineering. Check my work history. I have completed 300+ academic and technical writing projects on network, security, digital forensic, clou Mais

£300 GBP in 5 dias
(132 Comentários)
7.1
mhamdy1

I am a Cisco expert with an experience up to 12 years as a senior network engineer in an enterprise level campus as a full-time senior network engineer, and in afternoon as a part-time Cisco instructor, which make fro Mais

£555 GBP in 10 dias
(21 Comentários)
4.4
kaindo2017

I'm a Bsc degree holder in computer science. I have worked on many papers in report writing, research.I have read and understood your requirement and I know you will never regret, thank you.

£250 GBP in 10 dias
(9 Comentários)
3.8
ahmed4499

hi sir i am computer engineer and certified labview developer , and master in cryptography so your task i can do it for you in proficient manner

£555 GBP in 10 dias
(2 Comentários)
3.3
donhuan

Dear Hiring Manager I am an expert in Information Security. I have a lot of experience encryption. With 8-year experience in these fields, I can guarantee to complete your job well. Can I start? Best Regards, d Mais

£411 GBP in 7 dias
(2 Comentários)
2.6
Randyvc

Hi My name is Randy, I'm a security expert based at Costa Rica. I'm very interested in your project, I'm skilled in what you are looking for, feel free to ping me to discuss more details about the project. Mais

£277 GBP in 15 dias
(4 Comentários)
2.0
Sindustrus

Hi, I am a enthusiastic freelancer and have a bunch of experience in doing projects related to your skill. You can check my profile. Please consider

£250 GBP em 1 dia
(1 Comentário)
1.3
zeganaft

Hello sir! I am ready to start ASAP and provide needed doc for class reading. I have 12 years of experience in information security so I will complet the task quick and good

£444 GBP in 3 dias
(1 Comentário)
0.0
aliakbar292

Hi, i have recently completed my Master of IT with specialisation of Inter-networking and cyber security from Macquarie university and i have worked on the same assignments many times, so i believe that i'm the right Mais

£500 GBP in 5 dias
(0 Comentários)
0.0
naeyna

I'll analyze the situation and work accordingly. Have previous experience for writing scenario based answers as part of coursework and thesis.

£555 GBP in 3 dias
(0 Comentários)
0.0