Assignment Title: Cryptography basics, security analysis, design and implementation
Part I - Cryptography basics
RSA:
1. Assume a public key for RSA encryption given by the pair (143,11). Find the private key corresponding to this pair.
2. Using the pair (143, 11), decode the encrypted message (111 4 88 57 116 67) assuming the letters were represented by ASCII values (recall that the ASCII values are 65->A, 66->B, ... and 97->a, 98->b, ...)
Feige-Fiat-Shamir scheme
3. Describe in detail the simplified Feige-Fiat-Shamir accreditation scheme between Peggy and Victor?
4. Consider the simplified Feige-Fiat-Shamir scheme with parameters n=15 and r=11. Trace with these values the contents of all the messages that Peggy and Victor will send/receive.
Diffie-Hellman protocol
5. Describe in detail the Diffie-Hellman protocol for three parties Alice, Bob and Carol.
Part II - Security analysis and design
Scenario I - Security models
Your tasks: You should produce a short report (around 500 words) to formalise a Bell Lapadula model to address the confidentiality properties for the specified scenario, and to discuss the strength and weakness of your model.
Scenario II - Security Analysis and Solutions to Conference Management Systems
Your tasks: You are asked to produce a report (1500-2000words) to provide contemplate descriptions of the above Web-based Conference Management System and identify the following:
1. Assets and security properties: what objects should be protected, what security properties might we expect the system to enforce? For each such security property, label it with one of: confidentiality, integrity, or availability?
2. Vulnerability: explain the vulnerability in the system and use an attack tree/model to describe how an attack could be mounted. Restrict your consideration to the threat model provided.
3. Protection: explain what cost-effective protections are available against the threats that you identify. Remember the focus is on software vulnerabilities.
Scenario III- Design and Implementation of a Secure Server Network
Your tasks: You should write a report with the appropriate details (2500 words max, but flexible) documenting all that you have done including how the servers are setup, how they are tested and how the attacks are done to them along with countermeasures. Use the tasks below as a guideline to write.
1. Using the Virtual Machines, configure ANYONE server namely Windows2008/2012 or Ubuntu(or other Linux servers), with the following: (i) DNS server (ii) DHCP server (iii) web server. Use a client computer to test the three servers to see if it works properly. Capture the appropriate screen shots or illustrate that through commands and output screens. Draw a simple network or workflow diagram of your network.
Hints:
DNS Server: Show that the smithlogistics.com (or similar) domain name is configured and that the clients could join it. Create some users and login in to the domain. Test what was implemented.
DHCP Server: Show the dynamic IP address assignment with an address pool along with evidence of clients receiving dynamic IP.
Web server: Configure IIS and Apache with web address www.smithlogistics.com (or similar) can be accessed from the web client. Test the web server with a sample webpage being accessed from the client. Install an SSL certificate to make it secure.
2. Implement at least four security attacks on the servers through Kali Linux or other independent tools and suggest countermeasures to stop them. Illustrate the attacks through commands or using GUI tools. Capture the attacks through screen shots or graphs or tables.
3. Show the detailed cost of implementing your solution, in a table format. You can try to show two different costs for the company to choose from.
Hints: Research on the costs of servers (hardware and software), switches, workstations, cables, etc.
4. Show all references used in the report, using appropriate referencing.
Our N System Administration and Security Assignment Help service mostly hired professional native tutors, who all are well-versed with all the guidelines and formatting styles of all the reputed colleges and universities and always write the paper accordingly.
Tags: N System Administration and Security Assignment Help, N System Administration and Security Homework Help, N System Administration and Security Coursework, N System Administration and Security Solved Assignments, Cryptography Assignment Help, Cryptography Homework Help
Attachment:- System Administration and Security.rar