Preview

Unit 2 Assignment 2

Good Essays
Open Document
Open Document
676 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2
Unit 2 Assignment 2: Vulnerability of a Cryptosystem

1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.

Solution : for this we need to update the latest security patch for the security for the university to patch the flaw on the system. Using the assign on Microsoft page fallowing KB

2. We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.

Our attack takes advantage of a weakness in the MD5 cryptographic hash function that allows the construction of different messages with the same MD5 hash. This is known as an MD5 "collision". Previous work on MD5 collisions between 2004 and 2007 showed that the use of this hash function in digital signatures can lead to theoretical attack scenarios. Our current work proves that at least one attack scenario can be exploited in practice, thus exposing the security infrastructure of the web to realistic threats .

Solution: Well what I do is again maintain a update and secure the necessary SSL ports and redirecting the source of the attack and check were is coming.

3. A secure cryptographic hash algorithm is one that generates a unique identifier of a fixed size (known as a "digest" or simply "hash") for a block of data of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    IS4560 Hacking

    • 675 Words
    • 2 Pages

    2. Scrutinize SSL certificates signed by certificates using MD5 algorithm. Users may wish to manually analyze the properties of web site certificates that are signed by signing certificates using the MD5 algorithm. The procedures for accessing certificate details differ depending on the software in use but the signature algorithm is…

    • 675 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    12. How can hashing algorithm be used to provide authentication and data integrity. – lecture 3…

    • 356 Words
    • 2 Pages
    Good Essays
  • Good Essays

    “The Internet is a global network of interconnected computers, enabling users to share information along multiple channels.” (1) It was introduced to the public in the 1990s and became a part of everyday life. The internet enables people from different locations to connect and share data and files. The internet is also used to transfer important and sensitive information such as credit card numbers and passwords. Because of that many people try to exploit the vulnerabilities of the internet in order to gain access to this information or simply to cause malicious damage or use your computer for illegal purposes. In this report I will discuss some of the vulnerabilities and talk about the solutions used such as software and hardware.…

    • 1242 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    This paper describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer. In short, the attacker observes and controls everything the victim does on the Web.…

    • 2365 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Nfc Mobile Payment

    • 13449 Words
    • 54 Pages

    Illustrating this issue of “The Review” is a selection of photos by Julie Guiches. Julie is an independent “photo-graphist” who studies the urban landscape, its people and its changing faces; her photomontages question our assumptions about the place of the individual in society. The rhythms she creates by playing with time and space help us to understand the individual’s experience of reality. In addition to working for the press and advertizing, she is also a contemporary artist contributing to several networks spanning Paris and Barcelona, including Picturetank, Exyzt, Joystick… moving between photography, architecture and Street Art. Her work is on show at: www.studio-public.org.…

    • 13449 Words
    • 54 Pages
    Good Essays
  • Good Essays

    Dream Place

    • 722 Words
    • 3 Pages

    The advance of networking and digital-signal processing, along with the emergence of peer-to-peer technology, has made content piracy a major problem for copyright holders. Government agencies also face the challenge of protecting highly classified information from unauthorized redistribution. Cryptography can provide piracy protection during the transmission process, but when content is received and decrypted for display it can be illegally copied and redistributed.…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Information Technology solutions have paved a way to a new world of internet, business networking and e-banking, budding as a solution to reduce costs, change the sophisticated economic affairs to more easier, speedy, efficient, and time saving method of transactions. Internet has emerged as a blessing for the present pace of life but at the same time also resulted in various threats to the consumers and other institutions for which it’s proved to be most beneficial. Various criminals like hackers, crackers have been able to pave their way to interfere with the internet accounts through various techniques like hacking the Domain Name Server (DNS), Internet Provider’s (IP) address, spoofing, phishing, internet phishing etc. and have been successful in gaining “unauthorised access” to the user’s computer system and stolen useful data to gain huge profits from customer’s accounts…

    • 2401 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cyber crime is a rampant evil with its roots firmly planted on the growing dependence on computers in the contemporary scenario. In today's age when everything from small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications Various kinds of cyber crimes are prevailing in the world today. Hacking, bombing, diddling, spoofing, botnet attacks, salami attacks and viruses are capable of breaching the security in the…

    • 987 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Transistors research paper

    • 1565 Words
    • 5 Pages

    There are several ways to commit a cyber-crime, from the simple phishing scam to the massive spam send internationally to emails. Although these methods are still effective there are always new ways of exploiting security loopholes and bugs. This is why I present to you the top cyber-crime trends of 2013.…

    • 1565 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Computer Crime

    • 791 Words
    • 4 Pages

    Even though the Internet has transformed business computing and communications, it has also given rise to unprecedented computer security threats and mainly because of the information that can be gathered off the internet by the violators. The Internet is used for a highway storage capacity and people around the world are highly dependent on storing information on the internet and for sharing or transferring information from one place or point to another.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The internet, as we know, has grown rapidly over the last decade. It has given rise to many avenues in every field we can think of – be it education, entertainment, business, or sports. However with every boon there is a curse too. This curse is Cybercrime – illegal activities committed over the internet. The…

    • 6183 Words
    • 25 Pages
    Powerful Essays

Related Topics