Instructions
- The submission file must be in the format of PDF.
- Submission of the PDF file must be made via the online submission system on the course webpage.
Task 1 (3 marks)
What is the C.I.A.of security? Use examples to contrast security threats and attacks?
Task 2 (3 marks)
List 5 general design decisions that have to be made when constructing secure systems..
Task 3 (8 marks)
The smallest possible value for the modulus n for which the RSA algorithm works are
p =11, q =3 . Use the most simplest example of RSA to do encryption. We would let
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
Thus the plaintext message “HELLOWORD” would be represented by the set of integers
{9, 6, 13,13, 16, 24, 16, 19, 13, 5 } . Using the table above, please find ciphertext integers.
Task 4 (2 marks)
Select a topic from the following list for your assignment 3, which is a reading research project. Write an objective of this reading research project (not more than 30 words)
- Compare and Contrast the OpenSSL and GNU OpenGPG.
- Understanding the Kerberos System and its Authentication Protocols
- Generating Digital Certificates using OpenSSL
4. On the security and authentication of Web sites