1) Consider the following authentication protocol:
Client
|
Transmission
|
Host
|
Explanation
|
U, user
|
U à
|
|
I am user U
|
|
ß {n, DES, SHA-1}
|
n, random challenge, DES, SHA-1
|
- I have SHA_1(P(U)), where P(U) is password of user U
- Here is a random challenge n, please use DES and SHA-1 to generate a response
|
r=DES(n, SHA-1(P))
|
U, rà
|
|
Response r is the encryption of the hash of the password P of user U using key n, DES for encryption, and SHA-1 for hashing.
|
|
|
ß yes/no
|
Compare: DES-1(n, r) to SHA_1(P(U))
|
Can the password of user U be obtained by using an offline password guessing attack? If your answer is yes, describe the attack and write pseudocode for the password guessing algorithm. If your answer is no, describe why the protocol is resistant to an offline guessing attack.
2) Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)
3) You are the designer of a password security policy that requires passwords to expire once they have a probability of 0.001 of being guessed. A potential attacker can test 1,000,000 passwords per second. If you chose passwords to be alphanumeric ("A" through "Z", "a" through "z", and "0" through "9"), what would you have to set the maximum lifetime of a password to in order to meet the required guessing probability (represent in days)?Assume the password size is 9 characters.