(1)Please complete exercise 14.1, 14.2, 14.6, 14.7 in the book P273-274(Dieter-Gollmann-Wiley.Computer.Security)
Exercise 14.1 Cryptographic protocols are intended to let agents communicate securely over an insecure network. Is this statement correct?
Exercise 14.2 Cryptography needs physical security. To what extent is this statement correct?
Exercise 14.6 Consider the RSA signature algorithm without a hash function, i.e. s=me mod n. Explain how, and to what extent, an attacker could forge signatures if there are no redundancy checks on the message m.
Exercise 14.7 When a document is too long to be processed directly by a digital signature algorithm, a hash of the document is computed and then signed. Which properties do you require from this hash function to prevent an attacker from forging signatures?
• Distinguish between situations where the attacker only knows messages signed by the victim and situations where the attacker can choose messages the victim will sign.
• Distinguish between selective forgeries, where the attacker has control over the content of the forged message, and existential forgeries, where the attacker has no control over the content of the forged message.
• Consider the specific requirements of hash functions used with an invertible signature algorithm such as RSA.
(2)Please complete exercise 2 in chapter 10 in the book p563 (Management of Information Security 6th Edition by Michael E. Whitman)
Exercise 2: Go to http://csrc.nist.gov. Under “Publications,” select Special Publications, and then locate USP 800-34, Contingency Planning Guide for Information Technology Systems, June 2002.” Download and review this document. Summarize the key points for an in -class discussion.
(3)Please complete exercise 5 in chapter 11 in the book p616 (Management of Information Security 6th Edition by Michael E. Whitman)
Exercise 5: Using the components of risk assessment documentation presented in the chapter, draft a tentative risk assessment of a lab, department, or office at your university.Outline the critical risks you found and discuss them with your class
(4)Please complete exercise 1 in chapter 12 in the book p680 (Management of Information Security 6th Edition by Michael E. Whitman)
Exercise 1: Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?
(5)Using RSA(Rivest, Shamir&Adelman) encrypt and decrypt a given positive number, Q(Alphabet’s) 17th letter. Take {3, 13} as prime numbers. For a modulus calculator, use https://www.ti89.com/cryptotut/mod_arithmeti