Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4. Suppose a system of 3 users (Ahmed, Fares, Salman) and 5 files (F1, F2, F3, F4,F5) Ahmed can read and write F1, F4, F5

image text in transcribed

image text in transcribed

4. Suppose a system of 3 users (Ahmed, Fares, Salman) and 5 files (F1, F2, F3, F4,F5) Ahmed can read and write F1, F4, F5 Ahmed can read F3 and has no access to F2 Fares can read and write all the files Salman can write F2, F3, read F1,F4 and no access to F5 a- Create an access control matrix for the system? b- Write the ACL for each files c- Write the capabilities for each user 5. Assume a network with 150 users and they have to use symmetric cryptography to exchange messages. How many keys are required, to ensure a secure communication? 6. Suppose that we use a block cipher to encrypt according to the rule C0=IVE(P0,K),C1=C0E(P1,K),C2=C1E(P2,K), a. What is the corresponding decryption rule? b. Give two security disadvantages of this mode as compared to CBC mode. 7. Suppose that you know a MAC value X and the key K that was used to compute the MAC, but you do not know the original message. Show that you can construct a message M that also has its MAC equal to X. Note that we are assuming that you know the key K and the same key is used for both MAC computations

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Describe the new structures for the HRM function. page 676

Answered: 1 week ago