Question 1: Which cryptography for a company in expansion? (20 points)
A successful financial company based in the North East is about to open a second office in the south of the country. The CEO decides to introduce “security” to the digital communications amongst staff but is unsure whether to use symmetric or public-key cryptography.
You are hired by the CEO to write a short report (1000 words max) advising the company.
Question 2: Keccak (15 points)
Write a short report on the SHA-3 (a.k.a Keccak), its strengths and weaknesses. (750 words max).
Question 3: Prof. McMenteur’s claim (15 points)
Geology professor Peter McMenteur gets interested in Lamport’s authentication scheme. After a brief study of this, he claims that the scheme works even if the hash function is substituted by a function that is only easy to compute and hard to invert (i.e., a hash function without the property of collision resistance).
Question 4: Design and Implementation of a Secure Server Network (50 points)
This task involves designing and implementing an Internet-connected secure server network for a medium sized company named BETA Enterprise, UK. They want to implement a secure network that uses Class C network address with two subnets in total – server subnet and one LAN subnet and has approached you. They have asked you for a price quote as well. But they want to see a virtual machine implementation and simulation results before they commit to purchase anything.
You can use Virtual Machines as in the figure below for the implementation and the security attacks. The server network should consist of one server, i.e. Windows 2008/2012 or Linux (Ubuntu or others). It
– 1 -Teesside University School of Computing, Media and the Arts should be connected to one workstation (at the least), i.e. Windows Server to Windows client or Linux Server to Linux client. The workstation denotes a different LAN.
Write a report with the appropriate details (2500 words max, but flexible) documenting all that you have done including how the servers are setup, how they are tested and how the attacks are done to them along with countermeasures. Use the tasks below as a guideline to write.
Please do the following tasks:
Buy Online Assignment Help services for COMPUTER ASSIGNMENT with Punjab Assignment Help at email@example.com