Preview

Unit 2 Assignment 2

Good Essays
Open Document
Open Document
676 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2
Unit 2 Assignment 2: Vulnerability of a Cryptosystem

1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.

Solution : for this we need to update the latest security patch for the security for the university to patch the flaw on the system. Using the assign on Microsoft page fallowing KB

2. We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.

Our attack takes advantage of a weakness in the MD5 cryptographic hash function that allows the construction of different messages with the same MD5 hash. This is known as an MD5 "collision". Previous work on MD5 collisions between 2004 and 2007 showed that the use of this hash function in digital signatures can lead to theoretical attack scenarios. Our current work proves that at least one attack scenario can be exploited in practice, thus exposing the security infrastructure of the web to realistic threats .

Solution: Well what I do is again maintain a update and secure the necessary SSL ports and redirecting the source of the attack and check were is coming.

3. A secure cryptographic hash algorithm is one that generates a unique identifier of a fixed size (known as a "digest" or simply "hash") for a block of data of

You May Also Find These Documents Helpful

  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    Operation Aurora Overview

    • 1078 Words
    • 5 Pages

    Cyber-attacks are common in the defense industry, but in January 2010, a sophisticated, advanced persistent threat hacked into the commercial sector forever changing the face of cyber security. Dubbed “Operation Aurora” by McAfee, the attack targeted specific high profile corporations to obtain valuable intellectual property. Google, Yahoo, Juniper Networks and Adobe Systems were also among the victims of this highly coordinated cyber heist. By manipulating computer codes the attackers were able to exploit the Microsoft Internet Explorer vulnerabilities to gain access and obtain valuable sensitive information from over thirty high profile companies. Operation Aurora proves that the world is entering into a high-risk era where cybercrimes are no longer solely targeting governments but all sectors of different corporations and companies that were once immune are now under threat (McAfee Labs and McAfee Foundstone Professional Services 1).…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Good Essays

    12. How can hashing algorithm be used to provide authentication and data integrity. – lecture 3…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cyber Terrorism

    • 571 Words
    • 3 Pages

    The greater threat to our nation is not the cyber crimes against individuals such as identify theft but the potential terrorist cyber attacks on national institutions. Whereas, security theft, credit fraud and other cyber crimes against individuals have had devastating impact to our society and as pointed out by Anne Bordon (2007) the annual cost in the United States is estimated to be a staggering 500 million. Although, a notably significant amount this figure does not compare to the possible damages a cyber terrorist attack would impose to our country’s vital infrastructures. The many systems that Americans relay upon daily for banking, transportation, energy and national defense would have a devastating negative impact if subjected to a successful cyber attack. “Cyberwar would not be as lethal as atomic war, nor as visibility drastic but if a single large American bank were successfully attacked it could have an order-of-magnitude greater impact on the global economy than the Sept. 11, 2001, attacks” (Sanger, Markoff, and Shanker). Cyberwar and the constant cyber threats caused by the United States potential adversaries has caused for concerns to protect these system’s vulnerabilities. Our government and Department of Defense (DoD) are constantly implementing ways to increase their network defenses to prevent compromise to these systems through cyber attacks.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This paper describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer. In short, the attacker observes and controls everything the victim does on the Web.…

    • 2365 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    • the complex, leakage-prone information flow of many Web-based transactions that involve the transfer of sensitive, personal information. [4]…

    • 1135 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Transistors research paper

    • 1565 Words
    • 5 Pages

    "Concise Courses Security Blog." Information Security 5 Trends with Regards to the Future of Modern Cyber Crime Comments. N.p., n.d. Web. 01 Apr. 2014.…

    • 1565 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Computer Crime

    • 791 Words
    • 4 Pages

    Even though the Internet has transformed business computing and communications, it has also given rise to unprecedented computer security threats and mainly because of the information that can be gathered off the internet by the violators. The Internet is used for a highway storage capacity and people around the world are highly dependent on storing information on the internet and for sharing or transferring information from one place or point to another.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Dream Place

    • 722 Words
    • 3 Pages

    The advance of networking and digital-signal processing, along with the emergence of peer-to-peer technology, has made content piracy a major problem for copyright holders. Government agencies also face the challenge of protecting highly classified information from unauthorized redistribution. Cryptography can provide piracy protection during the transmission process, but when content is received and decrypted for display it can be illegally copied and redistributed.…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber crime is a rampant evil with its roots firmly planted on the growing dependence on computers in the contemporary scenario. In today's age when everything from small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications Various kinds of cyber crimes are prevailing in the world today. Hacking, bombing, diddling, spoofing, botnet attacks, salami attacks and viruses are capable of breaching the security in the…

    • 987 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Technology solutions have paved a way to a new world of internet, business networking and e-banking, budding as a solution to reduce costs, change the sophisticated economic affairs to more easier, speedy, efficient, and time saving method of transactions. Internet has emerged as a blessing for the present pace of life but at the same time also resulted in various threats to the consumers and other institutions for which it’s proved to be most beneficial. Various criminals like hackers, crackers have been able to pave their way to interfere with the internet accounts through various techniques like hacking the Domain Name Server (DNS), Internet Provider’s (IP) address, spoofing, phishing, internet phishing etc. and have been successful in gaining “unauthorised access” to the user’s computer system and stolen useful data to gain huge profits from customer’s accounts…

    • 2401 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS4560 Hacking

    • 675 Words
    • 2 Pages

    Now the secondary affect is that the MD5 hashes may allow for certificate spoofing on a Cisco ASA system.…

    • 675 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Message-Digest algorithm 5 (MD5) that the University uses has significant weaknesses that can be exploited by attacks. Attackers can launch attacks against X.509 digital certificates signed using the MD5 hashing algorithm, to generate additional digital certificates. Vulnerability in the Internet Public Key Infrastructure (PKI) can allow rogue Certification Authority (CA) certificate trusted by all common web browsers. Rogue Certification Authority (CA) certificate, can…

    • 385 Words
    • 2 Pages
    Good Essays