Using JCA in Java- 5pgs due in 5hrs

Estimation of time required for brute-force search attack on the password-based encryption

(To use the attached program, do not use your own program,please)

This assignment asks you to estimate the time required for successful brute-force search attack on password-based encryption using JCA in Java. It assumes that you have done Lab 1, Lab2, Lab3 (see attachment).

Make a list of passwords, mentioned in item 3 of Section 1.2 of Lab 1 instructions (page 2)

For password-based DES encryption implementation in JCA (Lab 2 and Lab 3) fix some salt and iteration count and record an average time required for encryption/decryption (done in Lab 3);

For each of the passwords above estimate the time required for successful brute-force search attack, assuming that an attacker knows:

• the predefined plaintext;

• the ciphertext produced;

• the salt;

• the iteration count;

• but no password.

Investigate how the time required for the attack depends on the iteration count;

Consider a variant of the attack, in which an attacker knows everything as above, except the iteration count, and estimate the time required to recover the passwords;

Compare your estimated time with the estimated time returned for the same passwords by online services (Lab 1, page 2) and propose plausible explanation of any observed differences.

Write a report on the above, providing an evidence for your arguments (e.g. snippets of code used to estimate time required for one encryption).

Analyze Current Security Products and Services

 

Complete a three to four-page report with APA cited references to support your work.

Searching for Vendor Information (without getting a ton of sales calls)

It is often helpful to research a Vendor and their products before contacting the company, (when you contact the company, you often are inundated by sales calls). Your assignment this week is to gather information on a provider of security/privacy products and write a short recommendation document. Include in your report:

  • types of services this vendor provides
  • facts about this company that would lead to their reliability as a provider
  • how they compare to other similar vendors (you will need to look at a few companies to gather this information).

Essay Questions

 

  • Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.
  • Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

COMPUTER SCIENCE

Class Discussion Topics 
( MS POWER POINT) SLIDES, PRESENTATION
  1. Discuss the conditions necessary for a deadlock to occur. If given the option of removing one condition to prevent deadlock, which condition would you eliminate? Why?
  2. Discuss different deadlock handling strategies. Which strategies would you like to implement to remove deadlocks in the cases of disk sharing, database sharing, and multiple device allocation? Select a suitable strategy in each case and provide reasons for your choices.
Additional Resources
  1. Deadlock: http://www.computer-dictionary-online.org/?q=deadlock
  2. Deadlock and Starvation: https://www.studyblue.com/notes/note/n/ch6-deadlock-and-starvation-ppt-13/deck/8173602

Organizational Security and Privacy

 Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats.