SlideShare a Scribd company logo
The Rivest-Shamir-Adleman (RSA) is a system for public
key encryption used in securing sensitive data being sent over
an insecure network such as the internet. The cryptographic
standard makes use of an asymmetric approach where two
different but mathematically linked keys are generated where
one is public and one private. The public key is shareable with
anyone while the private key needs to be kept secret. In sending
a message, both keys are used for encryption where an opposite
key is used in decryption of a message. This has helped RSA
become an industry standard in sharing information across the
internet. The RSA standard is the most secure information
exchange protocol in the world. Therefore, in this case, there is
are low chances of proving that the standard was hacked for the
message to be sent (Mahajan & Sachdeva, 2013).
From the facts gathered, it can be said that Angela offered
Florence a huge sum of money as a token of appreciation for
receiving dedicated service from Florence over continued
interactions. However, this is a cover up by Florence who tried
to fraud Angela since she has all her information required to
generate a message as if it was coming from Angela. However,
the cryptographic message sent was sent after the transfer
therefore giving evidence that the transaction was carried out
beforehand then the message was sent later. The timestamp on
the cryptographic message when compared against the time
Florence moved and made the transfer would help build a case
against her where she would be guilty of theft and fraud.
The relevance of Nevis in this case study is that the island
has offerings for legitimate business owners where those
seeking a flexible tax haven to run their operations in can find
refuge. This is because the government of Nevis has made
exhibitions of making total commitments to maintenance of
protection and privacy of legitimate business owners. Nevis and
St. Kitts have not ad their records tainted with cases of tax
evasion or money laundering as compared to other offshore
jurisdictions. The reason for offshoring in Nevis is because a
Nevis offshore company is exempted from taxation in income
generated outside Nevis and there are no income taxes.
However, neither are there capital gains, estate, inheritance, gift
and duty taxes.
The people of Nevis are well-educated and English
speaking with them having modern infrastructure set up within
their island. There is internet connectivity, infrastructure for
transportation and living and for wireless communications. It
operates independently as a country with it having a
democratically elected governance which is based on British
common Law. Citizenship is offered for citizens though an
investment program where there are no requirements for
residency. Also, citizenship is extensible to all family members
who are dependent on an individual inclusive of parents.
The role of Nevis in this scenario is that it offers
citizenship to all citizen who wish to invest with it offering
safeguards to all citizens who are interested in living there.
The significance of Nevis Island in this case is that the
islands are protected from being affected by external systems
and laws with them operating independently. Nevis has not
been faced with issues relating to criminal activities therefore
offering its citizens protection from external rules which may
affect quality of life negatively. However, Angela asking for
interest rates does not work in her favor since it places her as a
potential crime suspect to the organization. And in the message,
being sent out from her account giving a huge sum of money to
an employee is a red flag which could victimize Angela.
However, the crime was ultimately carried out by Florence due
to having all keys was able to replicate a message as if it came
from Angela (Padmavathi & Kumari, 2013).
In the investigation, there is need to calculate whether the
message was encrypted using the public or private key to
determine the origin of the message to determine who initiated
it. The message header should also be inspected since it
contains information about a message such as the source and
destination addresses. There is need for analysis of the
algorithm in-depth of the loopholes within the communication
between Angela and Florence by analyzing previous messages
as well as the strength of the public and private keys to
determine whether it was strong enough to protect from
unauthorized data origination.
The RSA standard is the most secure industry standard
where its security is derived from large integers being factored
with the integers being a product of two prime numbers.
Multiplication of the integers is easy however the challenge of
determination of the original prime numbers is considered
infeasible since it would take a long period of time which even
the most modern computers would not be able to calculate fast
enough. The encryption standard works by generating two large
prime numbers using the Rabin-Miller algorithm for primary
tests. Then a modulus is calculated by multiplication of the two
prime numbers. The result is then used by the key pairs to
create a link (Padmavathi & Kumari, 2013).
The public key information can be published however the
private key is kept secret with it comprising of the modulus and
the private exponent derived through using the Extended
Euclidean algorithm where the multiplicative inverse is arrived
at with respect to the totient of the modulus. Th security of the
standard is dependent on the complexity and computation
difficulties placed by integers which are large. Discovery of
increased efficiency for the standard is being continually
achieved with an increase in computing power. In doubling the
key length there is increased security and strength of the pair
therefore making it almost unbreakable (Mahajan & Sachdeva,
2013).
References
Mahajan, P., & Sachdeva, A. (2013). A Study of Encryption
Algorithms AES, DES and RSA for security. Global Journal of
Computer Science and Technology, 13(15).
Padmavathi, B., & Kumari, S. R. (2013). A survey on
performance analysis of DES, AES and RSA algorithm along
with LSB substitution. Int. J. Sci. Res, 2(4), 170-174.
Description: The scenario description and requirements for
Short Paper #1:
Prepare a short research paper of approximately 1300-1500
words, double-spaced, exclusive of cover, title page, and table
of contents, endnotes and bibliography. Your paper must use
APA formatting with the exception that tables and figures can
be inserted at the appropriate location rather than added at the
end. Submit the paper in your assignment folder as a Word
attachment with the following file name:
YourlastnameFirstname INFA640 SP1.doc
(For example, my submission file would be
PathakDivakerINFA640 SP1.doc)
If you are unable to virus check your document, please submit
as an rtf file rather than as a doc file. Please do not use macros
in your document.
Be certain that your paper contains the required certification as
specified in the syllabus.
I will submit your paper to Turnitin.com to ensure non-
plagiarisation
Assume the following incidences happened five years ago so
neglect recent agreements between the US and the Cayman
Island government.
Scenario:
Angela, a high net worth customer, banks on-line at
Trustworthy Bank and Trust (TBT) and has agreed to use 3DES
(also known as Triple DES) in communicating with TBT. One
day, Angela received a statement showing a debit of $1,000,000
from her account. On inquiring, she was told that the bank
manager, Jolene, transferred the money out of Angela’s account
and into an account of her own in an offshore bank in the
Cayman Islands. When reached via long distance in the Cayman
Islands, Jolene produced a message from Angela, properly
encrypted with the agreed upon 3DES keys, saying:
“Thanks for your many years of fine service, Jolene. Please
transfer $1,000,000 from my account to yours as a token of my
esteem and appreciation; Signed Angela.
Angela filed suit against Jolene, TBT and the government of the
Cayman Islands, claiming that the message was a forgery, sent
by Jolene herself and asking for triple damages for pain and
suffering. TBT likes to file a counter suit against Angela,
claiming that all procedures were followed properly and that
Angela is filing a nuisance suit.
You have been employed by TBT as a cryptographic expert and
consultant to investigate, give recommendations based on your
findings including how to proceed with the suit and to produce a
report for the TBT Board of Directors, which will provide basis
for them in determining how to proceed in this matter.
Your report to the Board of Directors should address but not
limited to the following issues:
· From the facts as presented, what can be determined about
whether Angela intended to make Jolene a gift of $1,000,000?
What are the critical points in determining intention of Angela?
State your conclusion and how did the facts help you in forming
your conclusion?
· What is the significance of Cayman Island? Did it affect your
conclusion?
· Assuming TBT wishes to continue using only 3DES as its
cryptographic system, what advice would you give to TBT and
the customer or what could TBT and Angela have done to
protect against this controversy arising?
· Would this controversy have arisen if TBT had been using
AES rather than 3DES?
· What is a plausible explanation of what may have happened in
this case?
Your report should clearly address these issues, with sufficient
detail and background to allow the "cryptographically
challenged" Board of Directors to understand the issues
involved and recommendation to formulate plans for how to
approach the immediate issue with Angela, and to continue
business in the future, assuming that they want to continue
using 3DES
Assuming TBT wishes to continue using 3DES as its
cryptographic system, explain what TBT and Angela could have
done to protect against this controversy arising
Short Paper #2
Description: The scenario description and requirements for
Short Paper #2:
Prepare a short research paper of approximately 900-1000
words, double-spaced, exclusive of cover, title page, table of
contents, endnotes and bibliography. Your paper must use APA
formatting with the exception that tables and figures can be
inserted at the appropriate location rather than added at the end.
Submit the paper in your assignment folder as a Word
attachment.
Please name submission file:
LastnameFirstname INFA640 SP2.doc;
Example: PathakDivaker INFA640 SP2.doc
Be certain that your paper contains the required certification as
specified in the syllabus.
I will submit your paper to Turnitin.com to ensure non-
plagiarisation
Scenario:
Angela changes banks following her troubles with TBT. At her
new bank, First Security Trust (FST), RSA is used as the
cryptographic system. Angela creates a key pair and supplies to
Felicity, an officer of FST who will handle her account, with
her public key {eA, nA}, securing her private key {dA, nA} on
a thumb drive which he keeps locked in a wall safe at her home.
In turn, Felicity gave Angela access to a key server maintained
by FST so that she can readily obtain Felicity’ current public
key {eF, nF} whenever she needs to communicate securely with
Felicity.
Things are fine for several months until Angela sends Felicity a
message m asking about current interest rates on Certificates of
Deposit issued by FST. As shown below, she enciphers the
message first, and then signs it
C = (mef mod nf)dAmod nA
Where C is the encrypted message and m is the plaintext
message.
A few days later, Angela received a statement that shows a
debit of $1,000,000 from her account. On inquiring, she was
told that Felicity transferred the money out of Angela’s account
into an account of her own in a bank on the Caribbean island of
Nevis, where she moved. When reached via long distance in
Nevis, Felicity produced a message ’g’ from Angela saying:
"Thanks for your excellent service, Felicity. Please transfer
$1,000,000 from my account to yours as a token of my esteem
and appreciation. -Signed, Angela."
Angela files suit against Felicity, FST and the government of
the Nevis, claiming that the message was a forgery sent by
Felicity herself, asking for triple damages for pain and
suffering. Felicity has responded by claiming that all procedures
were followed properly and that Angela is filing a nuisance suit.
You have been employed by FST as a cryptographic expert to
assist in the investigation of this matter and help them decide
what to do with Angela issue. You obtain Felicity’s private key
from the UST server, and the cipher text C, and calculate
g= (CeAmod nA)dFmod nf
Where g is the plain text message which was obtained the cipher
text C
dF Is Felicity’s Private key
Your report to the FST Board of Directors should address the
following issues:
· From the facts as presented what can be determined about
Angela’s intentions to make Felicity a gift of $1,000,000? How
did the fact help you in forming your conclusion?
· What is the significance of Nevis Island?
· What is the significance of Angela’s message to Felicity
asking for interest rates?
· Assuming FST wishes to continue using RSA as its
cryptographic system, what UST and Angela could have done to
protect against this controversy arising?
· How to proceed in the litigation
Your report should clearly address these issues including
recommendation for the Angela’s suit, with sufficient detail and
background to allow the Board of Directors who are
cryptographically challenged to understand the issues involved
and formulate plans for how to approach the immediate issue
with Angela, and to continue business in the future, assuming
that they want to continue using only RSA. Assume that the
directors do not know what RSA is and/or how it works

More Related Content

PDF
MindingTheCloud_NPR_Sum2014-no cover
PDF
Iaetsd network security and
DOC
Steven Leahy_IT 543_Unit 1 Assignment
PDF
Cryptography And Embedded Systems Used
DOCX
1. Original Post by Catherine JohnsonCryptographic MethodsC
DOCX
1. Original Post by Catherine JohnsonCryptographic MethodsC
PPTX
Secure communication in Networking
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
MindingTheCloud_NPR_Sum2014-no cover
Iaetsd network security and
Steven Leahy_IT 543_Unit 1 Assignment
Cryptography And Embedded Systems Used
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
Secure communication in Networking
Updated Cyber Security and Fraud Prevention Tools Tactics

Similar to The Rivest-Shamir-Adleman (RSA) is a system for p.docx (14)

DOCX
Experiment
PDF
F5 networks the_expectation_of_ssl_everywhere
PPTX
Lofty Ideals: The Nature of Clouds and Encryption
PDF
What's new with Cybersecurity in Singapore?
PDF
The CypherWire - Encryption doesn't have to be cryptic
PDF
Cryptograpy Exam
PPTX
Patrick armstrong athens
PDF
Mobile Ad Hoc Networks ( Manets )
PDF
ODMOB Ransomware newsletter final
PDF
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
PDF
Review on variants of Security aware AODV
PDF
Understanding Digital Certificates & Secure Sockets Layer
PPT
CTO-CybersecurityForum-2010-RonWilliams
PPTX
Year of pawnage - Ian trump
Experiment
F5 networks the_expectation_of_ssl_everywhere
Lofty Ideals: The Nature of Clouds and Encryption
What's new with Cybersecurity in Singapore?
The CypherWire - Encryption doesn't have to be cryptic
Cryptograpy Exam
Patrick armstrong athens
Mobile Ad Hoc Networks ( Manets )
ODMOB Ransomware newsletter final
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...
Review on variants of Security aware AODV
Understanding Digital Certificates & Secure Sockets Layer
CTO-CybersecurityForum-2010-RonWilliams
Year of pawnage - Ian trump

More from oreo10 (20)

DOCX
All scientific theories must be able to make testable predictions. S.docx
DOCX
All I wnat is to write a reflection paper on my project which is hac.docx
DOCX
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
DOCX
All healthcare organizations must convert to an Electronic Health Re.docx
DOCX
All round writer onlyThis is an individual Mediation assignment..docx
DOCX
Alice was wondering whether it was a good idea to invest her money i.docx
DOCX
All organisms have DNA, which differs only in the number and order o.docx
DOCX
All literature involves some kind of performance which is intended f.docx
DOCX
All key elements of the assignment are covered in a substantiv.docx
DOCX
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docx
DOCX
Alice Jones was employed as a clerk-typist by a company. She request.docx
DOCX
Air and Water Pollution PaperAir and water pollutants exist in m.docx
DOCX
Air pollution is an environmental health problem in many cities thro.docx
DOCX
After your topic has been approved, the next step is to research.docx
DOCX
After watching three of the five movie clips listed in the Multime.docx
DOCX
Aging and Disability WorksheetPart IIdentify 2 or .docx
DOCX
After watching the video and reading the Web Resource, CDC Autism .docx
DOCX
AI Artificial Intelligence1Reading responsePeter .docx
DOCX
Agree or disagree with, and discuss the following statement Corp.docx
DOCX
After watching Reactions to an Impending Death Sentence and Ti.docx
All scientific theories must be able to make testable predictions. S.docx
All I wnat is to write a reflection paper on my project which is hac.docx
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
All healthcare organizations must convert to an Electronic Health Re.docx
All round writer onlyThis is an individual Mediation assignment..docx
Alice was wondering whether it was a good idea to invest her money i.docx
All organisms have DNA, which differs only in the number and order o.docx
All literature involves some kind of performance which is intended f.docx
All key elements of the assignment are covered in a substantiv.docx
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docx
Alice Jones was employed as a clerk-typist by a company. She request.docx
Air and Water Pollution PaperAir and water pollutants exist in m.docx
Air pollution is an environmental health problem in many cities thro.docx
After your topic has been approved, the next step is to research.docx
After watching three of the five movie clips listed in the Multime.docx
Aging and Disability WorksheetPart IIdentify 2 or .docx
After watching the video and reading the Web Resource, CDC Autism .docx
AI Artificial Intelligence1Reading responsePeter .docx
Agree or disagree with, and discuss the following statement Corp.docx
After watching Reactions to an Impending Death Sentence and Ti.docx

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
Microbial diseases, their pathogenesis and prophylaxis
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Practical Manual AGRO-233 Principles and Practices of Natural Farming
LDMMIA Reiki Yoga Finals Review Spring Summer
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Final Presentation General Medicine 03-08-2024.pptx
History, Philosophy and sociology of education (1).pptx
Anesthesia in Laparoscopic Surgery in India
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
A systematic review of self-coping strategies used by university students to ...
Updated Idioms and Phrasal Verbs in English subject
Final Presentation General Medicine 03-08-2024.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers

The Rivest-Shamir-Adleman (RSA) is a system for p.docx

  • 1. The Rivest-Shamir-Adleman (RSA) is a system for public key encryption used in securing sensitive data being sent over an insecure network such as the internet. The cryptographic standard makes use of an asymmetric approach where two different but mathematically linked keys are generated where one is public and one private. The public key is shareable with anyone while the private key needs to be kept secret. In sending a message, both keys are used for encryption where an opposite key is used in decryption of a message. This has helped RSA become an industry standard in sharing information across the internet. The RSA standard is the most secure information exchange protocol in the world. Therefore, in this case, there is are low chances of proving that the standard was hacked for the message to be sent (Mahajan & Sachdeva, 2013). From the facts gathered, it can be said that Angela offered Florence a huge sum of money as a token of appreciation for receiving dedicated service from Florence over continued interactions. However, this is a cover up by Florence who tried to fraud Angela since she has all her information required to generate a message as if it was coming from Angela. However, the cryptographic message sent was sent after the transfer therefore giving evidence that the transaction was carried out beforehand then the message was sent later. The timestamp on the cryptographic message when compared against the time Florence moved and made the transfer would help build a case against her where she would be guilty of theft and fraud.
  • 2. The relevance of Nevis in this case study is that the island has offerings for legitimate business owners where those seeking a flexible tax haven to run their operations in can find refuge. This is because the government of Nevis has made exhibitions of making total commitments to maintenance of protection and privacy of legitimate business owners. Nevis and St. Kitts have not ad their records tainted with cases of tax evasion or money laundering as compared to other offshore jurisdictions. The reason for offshoring in Nevis is because a Nevis offshore company is exempted from taxation in income generated outside Nevis and there are no income taxes. However, neither are there capital gains, estate, inheritance, gift and duty taxes. The people of Nevis are well-educated and English speaking with them having modern infrastructure set up within their island. There is internet connectivity, infrastructure for transportation and living and for wireless communications. It operates independently as a country with it having a democratically elected governance which is based on British common Law. Citizenship is offered for citizens though an investment program where there are no requirements for residency. Also, citizenship is extensible to all family members who are dependent on an individual inclusive of parents. The role of Nevis in this scenario is that it offers citizenship to all citizen who wish to invest with it offering safeguards to all citizens who are interested in living there. The significance of Nevis Island in this case is that the islands are protected from being affected by external systems and laws with them operating independently. Nevis has not been faced with issues relating to criminal activities therefore offering its citizens protection from external rules which may affect quality of life negatively. However, Angela asking for interest rates does not work in her favor since it places her as a potential crime suspect to the organization. And in the message, being sent out from her account giving a huge sum of money to an employee is a red flag which could victimize Angela.
  • 3. However, the crime was ultimately carried out by Florence due to having all keys was able to replicate a message as if it came from Angela (Padmavathi & Kumari, 2013). In the investigation, there is need to calculate whether the message was encrypted using the public or private key to determine the origin of the message to determine who initiated it. The message header should also be inspected since it contains information about a message such as the source and destination addresses. There is need for analysis of the algorithm in-depth of the loopholes within the communication between Angela and Florence by analyzing previous messages as well as the strength of the public and private keys to determine whether it was strong enough to protect from unauthorized data origination. The RSA standard is the most secure industry standard where its security is derived from large integers being factored with the integers being a product of two prime numbers. Multiplication of the integers is easy however the challenge of determination of the original prime numbers is considered infeasible since it would take a long period of time which even the most modern computers would not be able to calculate fast enough. The encryption standard works by generating two large prime numbers using the Rabin-Miller algorithm for primary tests. Then a modulus is calculated by multiplication of the two prime numbers. The result is then used by the key pairs to create a link (Padmavathi & Kumari, 2013). The public key information can be published however the private key is kept secret with it comprising of the modulus and the private exponent derived through using the Extended Euclidean algorithm where the multiplicative inverse is arrived at with respect to the totient of the modulus. Th security of the standard is dependent on the complexity and computation difficulties placed by integers which are large. Discovery of increased efficiency for the standard is being continually achieved with an increase in computing power. In doubling the key length there is increased security and strength of the pair
  • 4. therefore making it almost unbreakable (Mahajan & Sachdeva, 2013). References Mahajan, P., & Sachdeva, A. (2013). A Study of Encryption Algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology, 13(15). Padmavathi, B., & Kumari, S. R. (2013). A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. Int. J. Sci. Res, 2(4), 170-174. Description: The scenario description and requirements for Short Paper #1: Prepare a short research paper of approximately 1300-1500 words, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word attachment with the following file name: YourlastnameFirstname INFA640 SP1.doc (For example, my submission file would be PathakDivakerINFA640 SP1.doc) If you are unable to virus check your document, please submit as an rtf file rather than as a doc file. Please do not use macros in your document. Be certain that your paper contains the required certification as specified in the syllabus. I will submit your paper to Turnitin.com to ensure non- plagiarisation Assume the following incidences happened five years ago so neglect recent agreements between the US and the Cayman Island government. Scenario: Angela, a high net worth customer, banks on-line at Trustworthy Bank and Trust (TBT) and has agreed to use 3DES
  • 5. (also known as Triple DES) in communicating with TBT. One day, Angela received a statement showing a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Jolene, transferred the money out of Angela’s account and into an account of her own in an offshore bank in the Cayman Islands. When reached via long distance in the Cayman Islands, Jolene produced a message from Angela, properly encrypted with the agreed upon 3DES keys, saying: “Thanks for your many years of fine service, Jolene. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation; Signed Angela. Angela filed suit against Jolene, TBT and the government of the Cayman Islands, claiming that the message was a forgery, sent by Jolene herself and asking for triple damages for pain and suffering. TBT likes to file a counter suit against Angela, claiming that all procedures were followed properly and that Angela is filing a nuisance suit. You have been employed by TBT as a cryptographic expert and consultant to investigate, give recommendations based on your findings including how to proceed with the suit and to produce a report for the TBT Board of Directors, which will provide basis for them in determining how to proceed in this matter. Your report to the Board of Directors should address but not limited to the following issues: · From the facts as presented, what can be determined about whether Angela intended to make Jolene a gift of $1,000,000? What are the critical points in determining intention of Angela? State your conclusion and how did the facts help you in forming your conclusion? · What is the significance of Cayman Island? Did it affect your conclusion? · Assuming TBT wishes to continue using only 3DES as its cryptographic system, what advice would you give to TBT and the customer or what could TBT and Angela have done to protect against this controversy arising?
  • 6. · Would this controversy have arisen if TBT had been using AES rather than 3DES? · What is a plausible explanation of what may have happened in this case? Your report should clearly address these issues, with sufficient detail and background to allow the "cryptographically challenged" Board of Directors to understand the issues involved and recommendation to formulate plans for how to approach the immediate issue with Angela, and to continue business in the future, assuming that they want to continue using 3DES Assuming TBT wishes to continue using 3DES as its cryptographic system, explain what TBT and Angela could have done to protect against this controversy arising Short Paper #2 Description: The scenario description and requirements for Short Paper #2: Prepare a short research paper of approximately 900-1000 words, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word attachment. Please name submission file: LastnameFirstname INFA640 SP2.doc; Example: PathakDivaker INFA640 SP2.doc Be certain that your paper contains the required certification as specified in the syllabus. I will submit your paper to Turnitin.com to ensure non- plagiarisation Scenario: Angela changes banks following her troubles with TBT. At her new bank, First Security Trust (FST), RSA is used as the cryptographic system. Angela creates a key pair and supplies to
  • 7. Felicity, an officer of FST who will handle her account, with her public key {eA, nA}, securing her private key {dA, nA} on a thumb drive which he keeps locked in a wall safe at her home. In turn, Felicity gave Angela access to a key server maintained by FST so that she can readily obtain Felicity’ current public key {eF, nF} whenever she needs to communicate securely with Felicity. Things are fine for several months until Angela sends Felicity a message m asking about current interest rates on Certificates of Deposit issued by FST. As shown below, she enciphers the message first, and then signs it C = (mef mod nf)dAmod nA Where C is the encrypted message and m is the plaintext message. A few days later, Angela received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that Felicity transferred the money out of Angela’s account into an account of her own in a bank on the Caribbean island of Nevis, where she moved. When reached via long distance in Nevis, Felicity produced a message ’g’ from Angela saying: "Thanks for your excellent service, Felicity. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. -Signed, Angela." Angela files suit against Felicity, FST and the government of the Nevis, claiming that the message was a forgery sent by Felicity herself, asking for triple damages for pain and suffering. Felicity has responded by claiming that all procedures were followed properly and that Angela is filing a nuisance suit. You have been employed by FST as a cryptographic expert to assist in the investigation of this matter and help them decide what to do with Angela issue. You obtain Felicity’s private key from the UST server, and the cipher text C, and calculate g= (CeAmod nA)dFmod nf Where g is the plain text message which was obtained the cipher text C
  • 8. dF Is Felicity’s Private key Your report to the FST Board of Directors should address the following issues: · From the facts as presented what can be determined about Angela’s intentions to make Felicity a gift of $1,000,000? How did the fact help you in forming your conclusion? · What is the significance of Nevis Island? · What is the significance of Angela’s message to Felicity asking for interest rates? · Assuming FST wishes to continue using RSA as its cryptographic system, what UST and Angela could have done to protect against this controversy arising? · How to proceed in the litigation Your report should clearly address these issues including recommendation for the Angela’s suit, with sufficient detail and background to allow the Board of Directors who are cryptographically challenged to understand the issues involved and formulate plans for how to approach the immediate issue with Angela, and to continue business in the future, assuming that they want to continue using only RSA. Assume that the directors do not know what RSA is and/or how it works